{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","type":"ebuild","namespace":"app-emulation","name":"qemu-kvm","version":"1.1.1-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58884?format=json","vulnerability_id":"VCID-7m64-zt4t-73ep","summary":"Multiple vulnerabilities were found in qemu-kvm, allowing attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2512","reference_id":"","reference_type":"","scores":[{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69458","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69469","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69485","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69515","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69531","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69524","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69563","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69573","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69554","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69594","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69636","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69671","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69641","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00602","scoring_system":"epss","scoring_elements":"0.69667","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2512"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=717399","reference_id":"717399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=717399"},{"reference_url":"https://security.gentoo.org/glsa/201210-04","reference_id":"GLSA-201210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0919","reference_id":"RHSA-2011:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0919"},{"reference_url":"https://usn.ubuntu.com/1165-1/","reference_id":"USN-1165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1165-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}],"aliases":["CVE-2011-2512"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7m64-zt4t-73ep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3880?format=json","vulnerability_id":"VCID-j8js-mubz-y3d3","summary":"qemu-dm Local Privilege Escalation Vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0029","reference_id":"","reference_type":"","scores":[{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77379","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77431","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77473","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77471","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77463","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77498","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.7752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77526","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77554","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77576","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77564","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01041","scoring_system":"epss","scoring_elements":"0.77582","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=772075","reference_id":"772075","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=772075"},{"reference_url":"https://security.gentoo.org/glsa/201210-04","reference_id":"GLSA-201210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0050","reference_id":"RHSA-2012:0050","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0050"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0051","reference_id":"RHSA-2012:0051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0109","reference_id":"RHSA-2012:0109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0370","reference_id":"RHSA-2012:0370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0370"},{"reference_url":"https://usn.ubuntu.com/1339-1/","reference_id":"USN-1339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1339-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-6.html","reference_id":"XSA-6","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-6.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}],"aliases":["CVE-2012-0029"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8js-mubz-y3d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58883?format=json","vulnerability_id":"VCID-jxjy-ym55-7ya2","summary":"Multiple vulnerabilities were found in qemu-kvm, allowing attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2212.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2212","reference_id":"","reference_type":"","scores":[{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73737","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73732","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73802","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73784","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73776","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73818","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73825","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73816","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73851","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7386","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73854","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7388","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73903","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73866","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7389","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=713589","reference_id":"713589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=713589"},{"reference_url":"https://security.gentoo.org/glsa/201210-04","reference_id":"GLSA-201210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0919","reference_id":"RHSA-2011:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0919"},{"reference_url":"https://usn.ubuntu.com/1165-1/","reference_id":"USN-1165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1165-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}],"aliases":["CVE-2011-2212"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxjy-ym55-7ya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58885?format=json","vulnerability_id":"VCID-jz9n-rjmp-y3bk","summary":"Multiple vulnerabilities were found in qemu-kvm, allowing attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2652.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2652","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2036","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20223","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20247","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20202","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20139","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20138","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20014","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.19893","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.1997","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20057","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20026","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2005","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678280","reference_id":"678280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=824919","reference_id":"824919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=824919"},{"reference_url":"https://security.gentoo.org/glsa/201210-04","reference_id":"GLSA-201210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-04"},{"reference_url":"https://usn.ubuntu.com/1522-1/","reference_id":"USN-1522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1522-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}],"aliases":["CVE-2012-2652"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jz9n-rjmp-y3bk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58881?format=json","vulnerability_id":"VCID-re83-h7v6-pqcn","summary":"Multiple vulnerabilities were found in qemu-kvm, allowing attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1750.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1750","reference_id":"","reference_type":"","scores":[{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.6492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64923","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64971","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.65014","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.64982","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00476","scoring_system":"epss","scoring_elements":"0.65004","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1750"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=698906","reference_id":"698906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=698906"},{"reference_url":"https://security.gentoo.org/glsa/201210-04","reference_id":"GLSA-201210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0534","reference_id":"RHSA-2011:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0534"},{"reference_url":"https://usn.ubuntu.com/1145-1/","reference_id":"USN-1145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}],"aliases":["CVE-2011-1750"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-re83-h7v6-pqcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58882?format=json","vulnerability_id":"VCID-vhkn-geb6-2bdh","summary":"Multiple vulnerabilities were found in qemu-kvm, allowing attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1751.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1751","reference_id":"","reference_type":"","scores":[{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58783","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58857","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.5888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58848","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.589","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58886","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58896","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58953","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58937","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1751"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=699773","reference_id":"699773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=699773"},{"reference_url":"https://security.gentoo.org/glsa/201210-04","reference_id":"GLSA-201210-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201210-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0534","reference_id":"RHSA-2011:0534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0534"},{"reference_url":"https://usn.ubuntu.com/1145-1/","reference_id":"USN-1145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84369?format=json","purl":"pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}],"aliases":["CVE-2011-1751"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vhkn-geb6-2bdh"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu-kvm@1.1.1-r1"}