{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","type":"ebuild","namespace":"app-emulation","name":"qemu","version":"2.11.1-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.1.0-r4","latest_non_vulnerable_version":"8.0.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56776?format=json","vulnerability_id":"VCID-1erd-fd8p-hqch","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13672.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13672","reference_id":"","reference_type":"","scores":[{"value":"0.00668","scoring_system":"epss","scoring_elements":"0.71226","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.72046","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71965","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71995","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7196","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71988","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73618","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.7367","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73679","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73582","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73631","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73586","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00777","scoring_system":"epss","scoring_elements":"0.73609","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:N/I:N/A:P"},{"value":"3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486560","reference_id":"1486560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1486560"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873851","reference_id":"873851","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873851"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0816","reference_id":"RHSA-2018:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1104","reference_id":"RHSA-2018:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1113","reference_id":"RHSA-2018:1113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2162","reference_id":"RHSA-2018:2162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2162"},{"reference_url":"https://usn.ubuntu.com/3575-1/","reference_id":"USN-3575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-13672"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1erd-fd8p-hqch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56778?format=json","vulnerability_id":"VCID-d8cd-qgg7-fyed","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16845","reference_id":"","reference_type":"","scores":[{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84133","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84068","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84084","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84083","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.841","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83948","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83954","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.8397","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.83985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84012","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84019","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02074","scoring_system":"epss","scoring_elements":"0.84046","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"},{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4213","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4213"},{"reference_url":"http://www.securityfocus.com/bid/101923","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101923"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1514148","reference_id":"1514148","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1514148"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136","reference_id":"882136","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16845","reference_id":"CVE-2017-16845","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"10.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16845"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://usn.ubuntu.com/3575-1/","reference_id":"USN-3575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3575-1/"},{"reference_url":"https://usn.ubuntu.com/3649-1/","reference_id":"USN-3649-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3649-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-16845"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d8cd-qgg7-fyed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56780?format=json","vulnerability_id":"VCID-e3xt-vft1-kbbe","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18030.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18030","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28947","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28881","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28951","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28901","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28925","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28555","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28396","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28452","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28475","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28397","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28418","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28492","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18030"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1530360","reference_id":"1530360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1530360"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-18030"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e3xt-vft1-kbbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56779?format=json","vulnerability_id":"VCID-gmvy-m5mq-yycx","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17381.json","reference_id":"","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17381","reference_id":"","reference_type":"","scores":[{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40072","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39826","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39795","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39815","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39731","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39755","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.4022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40231","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40243","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40187","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39939","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.3973","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4213","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4213"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/12/05/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/12/05/2"},{"reference_url":"http://www.securityfocus.com/bid/102059","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102059"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1520782","reference_id":"1520782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1520782"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625","reference_id":"883625","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17381","reference_id":"CVE-2017-17381","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17381"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://usn.ubuntu.com/3575-1/","reference_id":"USN-3575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-17381"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmvy-m5mq-yycx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56782?format=json","vulnerability_id":"VCID-jnxy-g6wu-8ubu","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5683","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.0774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07758","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0816","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08226","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08208","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08235","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08289","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08117","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0801","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08123","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08059","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08028","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1530356","reference_id":"1530356","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1530356"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392","reference_id":"887392","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0816","reference_id":"RHSA-2018:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1104","reference_id":"RHSA-2018:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1113","reference_id":"RHSA-2018:1113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2162","reference_id":"RHSA-2018:2162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2162"},{"reference_url":"https://usn.ubuntu.com/3575-1/","reference_id":"USN-3575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2018-5683"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnxy-g6wu-8ubu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34654?format=json","vulnerability_id":"VCID-re7g-2nvj-j3dp","summary":"Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5748","reference_id":"","reference_type":"","scores":[{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81013","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81022","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81073","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81097","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81115","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81112","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81143","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.8115","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81184","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81206","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.8122","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01494","scoring_system":"epss","scoring_elements":"0.81262","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528396","reference_id":"1528396","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528396"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700","reference_id":"887700","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700"},{"reference_url":"https://security.gentoo.org/glsa/201804-07","reference_id":"GLSA-201804-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-07"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1396","reference_id":"RHSA-2018:1396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1929","reference_id":"RHSA-2018:1929","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1929"},{"reference_url":"https://usn.ubuntu.com/3576-1/","reference_id":"USN-3576-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3576-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2018-5748"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-re7g-2nvj-j3dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56777?format=json","vulnerability_id":"VCID-rkxf-jp2j-mqgf","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15124","reference_id":"","reference_type":"","scores":[{"value":"0.00759","scoring_system":"epss","scoring_elements":"0.73493","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00759","scoring_system":"epss","scoring_elements":"0.73403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00759","scoring_system":"epss","scoring_elements":"0.73429","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00759","scoring_system":"epss","scoring_elements":"0.73453","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00759","scoring_system":"epss","scoring_elements":"0.73412","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00759","scoring_system":"epss","scoring_elements":"0.73435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.8219","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.8224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82242","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82264","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.8228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82133","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01684","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:N/A:C"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4213","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4213"},{"reference_url":"http://www.securityfocus.com/bid/102295","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102295"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525195","reference_id":"1525195","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1525195"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806","reference_id":"884806","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15124","reference_id":"CVE-2017-15124","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15124"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0816","reference_id":"RHSA-2018:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1104","reference_id":"RHSA-2018:1104","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1113","reference_id":"RHSA-2018:1113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3062","reference_id":"RHSA-2018:3062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3062"},{"reference_url":"https://usn.ubuntu.com/3575-1/","reference_id":"USN-3575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-15124"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rkxf-jp2j-mqgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56781?format=json","vulnerability_id":"VCID-rxsw-t1ut-rkau","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18043.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18043","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32815","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32946","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32981","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32804","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32881","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32651","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32452","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32387","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32295","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32316","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32384","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1536377","reference_id":"1536377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1536377"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://usn.ubuntu.com/3575-1/","reference_id":"USN-3575-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3575-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-18043"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxsw-t1ut-rkau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56783?format=json","vulnerability_id":"VCID-uryz-5yk9-9fd7","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7550","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24463","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24617","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24523","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24421","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24437","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24404","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24275","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24235","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24121","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24202","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24265","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24207","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24224","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24308","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1549798","reference_id":"1549798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1549798"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041","reference_id":"892041","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1369","reference_id":"RHSA-2018:1369","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1643","reference_id":"RHSA-2018:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1644","reference_id":"RHSA-2018:1644","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1644"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1645","reference_id":"RHSA-2018:1645","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1645"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1646","reference_id":"RHSA-2018:1646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2462","reference_id":"RHSA-2018:2462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2462"},{"reference_url":"https://usn.ubuntu.com/3649-1/","reference_id":"USN-3649-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3649-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2018-7550"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uryz-5yk9-9fd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=json","vulnerability_id":"VCID-v8fp-rzfq-e3bs","summary":"Information leak via side effects of speculative execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5715","reference_id":"","reference_type":"","scores":[{"value":"0.88597","scoring_system":"epss","scoring_elements":"0.995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.88597","scoring_system":"epss","scoring_elements":"0.99501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89042","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-26T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99541","published_at":"2026-05-12T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.9953","published_at":"2026-04-13T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-18T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99539","published_at":"2026-05-11T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99542","published_at":"2026-05-14T12:55:00Z"},{"value":"0.89147","scoring_system":"epss","scoring_elements":"0.99538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99542","published_at":"2026-04-29T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99543","published_at":"2026-05-05T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99544","published_at":"2026-05-09T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99539","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:N/A:N"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102376","reference_id":"102376","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.securityfocus.com/bid/102376"},{"reference_url":"http://www.securitytracker.com/id/1040071","reference_id":"1040071","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.securitytracker.com/id/1040071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780","reference_id":"1519780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780"},{"reference_url":"https://www.kb.cert.org/vuls/id/180049","reference_id":"180049","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.kb.cert.org/vuls/id/180049"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/36","reference_id":"36","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://seclists.org/bugtraq/2019/Jun/36"},{"reference_url":"https://www.exploit-db.com/exploits/43427/","reference_id":"43427","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.exploit-db.com/exploits/43427/"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609","reference_id":"4609","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611","reference_id":"4611","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613","reference_id":"4613","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614","reference_id":"4614","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"},{"reference_url":"http://www.kb.cert.org/vuls/id/584653","reference_id":"584653","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.kb.cert.org/vuls/id/584653"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532","reference_id":"886532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852","reference_id":"886852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002","reference_id":"ADV180002","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-254.html","reference_id":"advisory-254.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-254.html"},{"reference_url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr","reference_id":"advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"},{"reference_url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt","reference_id":"ARUBA-PSA-2018-001.txt","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"},{"reference_url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt","reference_id":"ARUBA-PSA-2019-003.txt","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"reference_url":"https://security.archlinux.org/ASA-201801-10","reference_id":"ASA-201801-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-10"},{"reference_url":"https://security.archlinux.org/AVG-557","reference_id":"AVG-557","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-557"},{"reference_url":"https://security.archlinux.org/AVG-558","reference_id":"AVG-558","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-558"},{"reference_url":"https://security.archlinux.org/AVG-559","reference_id":"AVG-559","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-559"},{"reference_url":"https://security.archlinux.org/AVG-582","reference_id":"AVG-582","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-582"},{"reference_url":"https://security.archlinux.org/AVG-583","reference_id":"AVG-583","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-583"},{"reference_url":"https://security.archlinux.org/AVG-987","reference_id":"AVG-987","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-987"},{"reference_url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/","reference_id":"AWS-2018-013","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"},{"reference_url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel","reference_id":"cisco-sa-20180104-cpusidechannel","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"},{"reference_url":"https://support.citrix.com/article/CTX231399","reference_id":"CTX231399","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.citrix.com/article/CTX231399"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2017-5715","reference_id":"CVE-2017-5715","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.paloaltonetworks.com/CVE-2017-5715"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c","reference_id":"CVE-2017-5753;CVE-2017-5715","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"},{"reference_url":"https://spectreattack.com/spectre.pdf","reference_id":"CVE-2017-5753;CVE-2017-5715","reference_type":"exploit","scores":[],"url":"https://spectreattack.com/spectre.pdf"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us","reference_id":"display?docId=emr_na-hpesbhf03805en_us","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc","reference_id":"FreeBSD-SA-18:03.speculative_execution.asc","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://support.f5.com/csp/article/K91229003","reference_id":"K91229003","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.f5.com/csp/article/K91229003"},{"reference_url":"https://support.lenovo.com/us/en/solutions/LEN-18282","reference_id":"LEN-18282","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"},{"reference_url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001","reference_id":"mitel-product-security-advisory-18-0001","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"},{"reference_url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/","reference_id":"mitigations-landing-new-class-timing-attack","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html","reference_id":"msg00002.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html","reference_id":"msg00009.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180104-0001/","reference_id":"ntap-20180104-0001","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"},{"reference_url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html","reference_id":"reading-privileged-memory-with-side.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0016","reference_id":"RHSA-2018:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0017","reference_id":"RHSA-2018:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0018","reference_id":"RHSA-2018:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0020","reference_id":"RHSA-2018:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0021","reference_id":"RHSA-2018:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0022","reference_id":"RHSA-2018:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0023","reference_id":"RHSA-2018:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0027","reference_id":"RHSA-2018:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0028","reference_id":"RHSA-2018:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0292","reference_id":"RHSA-2018:0292","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1129","reference_id":"RHSA-2018:1129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1130","reference_id":"RHSA-2018:1130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1196","reference_id":"RHSA-2018:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1216","reference_id":"RHSA-2018:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1252","reference_id":"RHSA-2018:1252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1252"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1319","reference_id":"RHSA-2018:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1346","reference_id":"RHSA-2018:1346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1967","reference_id":"RHSA-2018:1967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1967"},{"reference_url":"https://spectreattack.com/","reference_id":"spectreattack.com","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://spectreattack.com/"},{"reference_url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html","reference_id":"Spectre-Information-Disclosure-Proof-Of-Concept.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"},{"reference_url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution","reference_id":"speculativeexecution","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"reference_url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability","reference_id":"speculative-processor-vulnerability","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf","reference_id":"ssa-608355.pdf","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"reference_url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/","reference_id":"suse-addresses-meltdown-spectre-vulnerabilities","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_18_01","reference_id":"Synology_SA_18_01","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.synology.com/support/security/Synology_SA_18_01"},{"reference_url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html","reference_id":"todays-cpu-vulnerability-what-you-need.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"},{"reference_url":"https://usn.ubuntu.com/usn/usn-3516-1/","reference_id":"usn-3516-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/usn/usn-3516-1/"},{"reference_url":"https://usn.ubuntu.com/3516-1/","reference_id":"USN-3516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3516-1/"},{"reference_url":"https://usn.ubuntu.com/3530-1/","reference_id":"USN-3530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3530-1/"},{"reference_url":"https://usn.ubuntu.com/3531-1/","reference_id":"USN-3531-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3531-1/"},{"reference_url":"https://usn.ubuntu.com/3531-3/","reference_id":"USN-3531-3","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3531-3/"},{"reference_url":"https://usn.ubuntu.com/3540-1/","reference_id":"USN-3540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-1/"},{"reference_url":"https://usn.ubuntu.com/3540-2/","reference_id":"USN-3540-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3540-2/"},{"reference_url":"https://usn.ubuntu.com/3541-1/","reference_id":"USN-3541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-1/"},{"reference_url":"https://usn.ubuntu.com/3541-2/","reference_id":"USN-3541-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3541-2/"},{"reference_url":"https://usn.ubuntu.com/3542-1/","reference_id":"USN-3542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3542-1/"},{"reference_url":"https://usn.ubuntu.com/3542-2/","reference_id":"USN-3542-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3542-2/"},{"reference_url":"https://usn.ubuntu.com/3549-1/","reference_id":"USN-3549-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3549-1/"},{"reference_url":"https://usn.ubuntu.com/3560-1/","reference_id":"USN-3560-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3560-1/"},{"reference_url":"https://usn.ubuntu.com/3561-1/","reference_id":"USN-3561-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3561-1/"},{"reference_url":"https://usn.ubuntu.com/3580-1/","reference_id":"USN-3580-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3580-1/"},{"reference_url":"https://usn.ubuntu.com/3581-1/","reference_id":"USN-3581-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3581-1/"},{"reference_url":"https://usn.ubuntu.com/3581-2/","reference_id":"USN-3581-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3581-2/"},{"reference_url":"https://usn.ubuntu.com/3582-1/","reference_id":"USN-3582-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3582-1/"},{"reference_url":"https://usn.ubuntu.com/3582-2/","reference_id":"USN-3582-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3582-2/"},{"reference_url":"https://usn.ubuntu.com/3594-1/","reference_id":"USN-3594-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3594-1/"},{"reference_url":"https://usn.ubuntu.com/3597-1/","reference_id":"USN-3597-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3597-1/"},{"reference_url":"https://usn.ubuntu.com/3597-2/","reference_id":"USN-3597-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3597-2/"},{"reference_url":"https://usn.ubuntu.com/3620-2/","reference_id":"USN-3620-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3620-2/"},{"reference_url":"https://usn.ubuntu.com/3690-1/","reference_id":"USN-3690-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3690-1/"},{"reference_url":"https://usn.ubuntu.com/3777-3/","reference_id":"USN-3777-3","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3777-3/"},{"reference_url":"https://cert.vde.com/en-us/advisories/vde-2018-002","reference_id":"vde-2018-002","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"},{"reference_url":"https://cert.vde.com/en-us/advisories/vde-2018-003","reference_id":"vde-2018-003","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"},{"reference_url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html","reference_id":"VMSA-2018-0002.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"},{"reference_url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html","reference_id":"VMSA-2018-0004.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"},{"reference_url":"https://www.vmware.com/security/advisories/VMSA-2018-0007.html","reference_id":"VMSA-2018-0007.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/security/advisories/VMSA-2018-0007.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-254.html","reference_id":"XSA-254","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-254.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/83166?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.11.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}],"aliases":["CVE-2017-5715"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"}