{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","type":"ebuild","namespace":"app-emulation","name":"qemu","version":"2.5.0-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.5.0-r2","latest_non_vulnerable_version":"8.0.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60192?format=json","vulnerability_id":"VCID-33jn-mjmh-7fc2","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2694.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2694.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2695.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2695.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2696.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2696.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7512","reference_id":"","reference_type":"","scores":[{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.9571","published_at":"2026-05-14T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95698","published_at":"2026-05-12T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95646","published_at":"2026-04-11T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95656","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.9566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95662","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95663","published_at":"2026-04-26T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95678","published_at":"2026-05-05T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95681","published_at":"2026-05-07T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95687","published_at":"2026-05-09T12:55:00Z"},{"value":"0.2106","scoring_system":"epss","scoring_elements":"0.95693","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/30/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/30/3"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/78230","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/78230"},{"reference_url":"http://www.securitytracker.com/id/1034527","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034527"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285061","reference_id":"1285061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285061"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806741","reference_id":"806741","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806741"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7512","reference_id":"CVE-2015-7512","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"9.0","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7512"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2694","reference_id":"RHSA-2015:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2695","reference_id":"RHSA-2015:2695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2696","reference_id":"RHSA-2015:2696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2696"},{"reference_url":"https://usn.ubuntu.com/2828-1/","reference_id":"USN-2828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2828-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-7512"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-33jn-mjmh-7fc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60189?format=json","vulnerability_id":"VCID-3yb2-bx65-1yaa","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6815.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6815.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6815","reference_id":"","reference_type":"","scores":[{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81476","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81559","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81546","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.8154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81578","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81604","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81634","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81655","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81678","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81695","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01574","scoring_system":"epss","scoring_elements":"0.81736","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260076","reference_id":"1260076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260076"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798101","reference_id":"798101","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798101"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2745-1/","reference_id":"USN-2745-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2745-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-6815"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3yb2-bx65-1yaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60205?format=json","vulnerability_id":"VCID-6dnf-5681-5yau","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0084.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0084.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0086.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0086.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0087.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0087.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0088.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0088.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1568.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1568","reference_id":"","reference_type":"","scores":[{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56612","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56526","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5655","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56456","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56552","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56609","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56603","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56602","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56512","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56576","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/09/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/09/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/09/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/09/2"},{"reference_url":"http://www.securityfocus.com/bid/80191","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/80191"},{"reference_url":"http://www.securitytracker.com/id/1034859","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034859"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1288532","reference_id":"1288532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1288532"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810527","reference_id":"810527","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810527"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1568","reference_id":"CVE-2016-1568","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1568"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0084","reference_id":"RHSA-2016:0084","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0084"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0086","reference_id":"RHSA-2016:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0087","reference_id":"RHSA-2016:0087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0087"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0088","reference_id":"RHSA-2016:0088","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0088"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2016-1568"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dnf-5681-5yau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60197?format=json","vulnerability_id":"VCID-72b8-m9rg-u7a4","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8558.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8558","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1368","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13688","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1347","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13626","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13816","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13699","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1361","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13606","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24812","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24737","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24756","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24833","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/14/16"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/14/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/14/9"},{"reference_url":"http://www.securityfocus.com/bid/80694","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/80694"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277983","reference_id":"1277983","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277983"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808144","reference_id":"808144","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808144"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8558","reference_id":"CVE-2015-8558","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8558"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8558"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-72b8-m9rg-u7a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4017?format=json","vulnerability_id":"VCID-8q9q-fs5n-gyfj","summary":"Privilege escalation via emulated floppy disk drive","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3456","reference_id":"","reference_type":"","scores":[{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96888","published_at":"2026-05-14T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.9685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96871","published_at":"2026-05-11T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96877","published_at":"2026-05-12T12:55:00Z"},{"value":"0.32263","scoring_system":"epss","scoring_elements":"0.96809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96911","published_at":"2026-05-07T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96918","published_at":"2026-05-09T12:55:00Z"},{"value":"0.32813","scoring_system":"epss","scoring_elements":"0.96903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97088","published_at":"2026-04-08T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.36084","scoring_system":"epss","scoring_elements":"0.97079","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1218611","reference_id":"1218611","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1218611"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424","reference_id":"785424","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c","reference_id":"CVE-2015-3456;OSVDB-122072","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c"},{"reference_url":"https://marc.info/?l=oss-security&m=143155206320935&w=2","reference_id":"CVE-2015-3456;OSVDB-122072","reference_type":"exploit","scores":[],"url":"https://marc.info/?l=oss-security&m=143155206320935&w=2"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://security.gentoo.org/glsa/201612-27","reference_id":"GLSA-201612-27","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0998","reference_id":"RHSA-2015:0998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0999","reference_id":"RHSA-2015:0999","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0999"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1000","reference_id":"RHSA-2015:1000","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1001","reference_id":"RHSA-2015:1001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1002","reference_id":"RHSA-2015:1002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1003","reference_id":"RHSA-2015:1003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1004","reference_id":"RHSA-2015:1004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1011","reference_id":"RHSA-2015:1011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1031","reference_id":"RHSA-2015:1031","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1031"},{"reference_url":"https://usn.ubuntu.com/2608-1/","reference_id":"USN-2608-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2608-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-133.html","reference_id":"XSA-133","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-133.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-3456"],"risk_score":0.6,"exploitability":"2.0","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60196?format=json","vulnerability_id":"VCID-9zjg-8t8b-a3ed","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8556.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8556","reference_id":"","reference_type":"","scores":[{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.9573","published_at":"2026-05-14T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95713","published_at":"2026-05-11T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95718","published_at":"2026-05-12T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95632","published_at":"2026-04-01T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95665","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95679","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95682","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95701","published_at":"2026-05-07T12:55:00Z"},{"value":"0.21208","scoring_system":"epss","scoring_elements":"0.95707","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8556"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.exploit-db.com/exploits/39010/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39010/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1292211","reference_id":"1292211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1292211"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39010.c","reference_id":"CVE-2015-8556","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39010.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8556","reference_id":"CVE-2015-8556","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"10.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8556"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8556"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9zjg-8t8b-a3ed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60185?format=json","vulnerability_id":"VCID-cr8f-zaj3-mkg5","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1772.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1772.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1837.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1837.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5225.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5225.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5225","reference_id":"","reference_type":"","scores":[{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37451","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3737","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37938","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37955","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37893","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37855","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37592","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37502","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37458","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37479","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37397","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:H/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3348","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3348"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/08/21/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/08/21/6"},{"reference_url":"http://www.securityfocus.com/bid/76506","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76506"},{"reference_url":"http://www.securitytracker.com/id/1033547","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033547"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1255896","reference_id":"1255896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1255896"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796465","reference_id":"796465","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796465"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5225","reference_id":"CVE-2015-5225","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5225"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1772","reference_id":"RHSA-2015:1772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1837","reference_id":"RHSA-2015:1837","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1837"},{"reference_url":"https://usn.ubuntu.com/2724-1/","reference_id":"USN-2724-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2724-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-5225"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cr8f-zaj3-mkg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4045?format=json","vulnerability_id":"VCID-dhgj-d3h1-cue7","summary":"heap buffer overflow vulnerability in pcnet emulator","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2694.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2694.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2695.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2695.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2696.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2696.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7504","reference_id":"","reference_type":"","scores":[{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73911","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73854","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73691","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73696","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73744","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73781","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73814","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73824","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73816","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73843","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.73867","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00783","scoring_system":"epss","scoring_elements":"0.7383","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/30/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/30/2"},{"reference_url":"http://www.securityfocus.com/bid/78227","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/78227"},{"reference_url":"http://www.securitytracker.com/id/1034268","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034268"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-162.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-162.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1261461","reference_id":"1261461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1261461"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742","reference_id":"806742","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7504","reference_id":"CVE-2015-7504","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7504"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://security.gentoo.org/glsa/201604-03","reference_id":"GLSA-201604-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201604-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2694","reference_id":"RHSA-2015:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2695","reference_id":"RHSA-2015:2695","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2695"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2696","reference_id":"RHSA-2015:2696","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2696"},{"reference_url":"https://usn.ubuntu.com/2828-1/","reference_id":"USN-2828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2828-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-162.html","reference_id":"XSA-162","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-162.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-7504"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dhgj-d3h1-cue7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60194?format=json","vulnerability_id":"VCID-eu1x-b3tw-dyfh","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8345.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8345.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8345","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2141","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21312","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21333","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21443","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21611","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21424","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21533","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21473","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21447","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21298","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21278","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2118","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21247","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21336","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/25/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/25/11"},{"reference_url":"http://www.securityfocus.com/bid/77985","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77985"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285213","reference_id":"1285213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1285213"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806373","reference_id":"806373","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806373"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8345","reference_id":"CVE-2015-8345","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8345"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2828-1/","reference_id":"USN-2828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2828-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8345"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu1x-b3tw-dyfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60203?format=json","vulnerability_id":"VCID-g7vj-24gg-uka5","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8744.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8744","reference_id":"","reference_type":"","scores":[{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2071","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20792","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20826","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20773","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20756","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20743","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20627","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20623","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20589","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20552","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20639","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20613","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20628","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1270871","reference_id":"1270871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1270871"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8744"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g7vj-24gg-uka5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60199?format=json","vulnerability_id":"VCID-gjq3-asym-bqat","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8568.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8568.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8568","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18906","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18804","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18995","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19182","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19039","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18992","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18809","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18707","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18811","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18772","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/15/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/15/10"},{"reference_url":"http://www.securityfocus.com/bid/79721","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79721"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289816","reference_id":"1289816","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289816"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145","reference_id":"808145","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8568","reference_id":"CVE-2015-8568","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8568"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8568"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gjq3-asym-bqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60202?format=json","vulnerability_id":"VCID-h2ap-vhnd-gbcb","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8743.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8743.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8743","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19904","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19935","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20138","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19866","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2002","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.199","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19791","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19785","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19755","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19665","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19742","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19827","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1979","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19817","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1264929","reference_id":"1264929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1264929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810519","reference_id":"810519","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810519"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8743"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ap-vhnd-gbcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60184?format=json","vulnerability_id":"VCID-h526-pk3x-xfb7","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1931.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1931.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1943.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1943.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1779.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1779","reference_id":"","reference_type":"","scores":[{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90374","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.9036","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90251","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90264","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90309","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90306","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.9032","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90328","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05573","scoring_system":"epss","scoring_elements":"0.90355","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3259","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3259"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/03/24/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/03/24/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/04/09/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/04/09/6"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/73303","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/73303"},{"reference_url":"http://www.securitytracker.com/id/1033975","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033975"},{"reference_url":"http://www.ubuntu.com/usn/USN-2608-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2608-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1199572","reference_id":"1199572","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1199572"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781250","reference_id":"781250","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781250"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1779","reference_id":"CVE-2015-1779","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-1779"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1931","reference_id":"RHSA-2015:1931","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1931"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1943","reference_id":"RHSA-2015:1943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1943"},{"reference_url":"https://usn.ubuntu.com/2608-1/","reference_id":"USN-2608-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2608-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-1779"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h526-pk3x-xfb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60188?format=json","vulnerability_id":"VCID-hqnb-2gxt-rke6","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5745.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5745","reference_id":"","reference_type":"","scores":[{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80577","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80561","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80618","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80524","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80546","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01402","scoring_system":"epss","scoring_elements":"0.80566","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01476","scoring_system":"epss","scoring_elements":"0.81024","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01476","scoring_system":"epss","scoring_elements":"0.81033","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83391","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.8339","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83353","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01921","scoring_system":"epss","scoring_elements":"0.83389","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.2","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:H/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1251157","reference_id":"1251157","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1251157"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795087","reference_id":"795087","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795087"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2724-1/","reference_id":"USN-2724-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2724-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-5745"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hqnb-2gxt-rke6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60187?format=json","vulnerability_id":"VCID-ku9y-24pu-g7gz","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5279.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5279.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5279","reference_id":"","reference_type":"","scores":[{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93109","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93112","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93119","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.9315","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93162","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93165","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.9318","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.9319","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93191","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93198","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10195","scoring_system":"epss","scoring_elements":"0.93215","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256672","reference_id":"1256672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256672"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799074","reference_id":"799074","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799074"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1896","reference_id":"RHSA-2015:1896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1923","reference_id":"RHSA-2015:1923","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1924","reference_id":"RHSA-2015:1924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1924"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1925","reference_id":"RHSA-2015:1925","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1925"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2065","reference_id":"RHSA-2015:2065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2065"},{"reference_url":"https://usn.ubuntu.com/2745-1/","reference_id":"USN-2745-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2745-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-5279"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ku9y-24pu-g7gz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60190?format=json","vulnerability_id":"VCID-njfq-vdgj-wfc8","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6855.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6855.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6855","reference_id":"","reference_type":"","scores":[{"value":"0.04251","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90537","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90546","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90451","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90468","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90482","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90503","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.905","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.90528","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05769","scoring_system":"epss","scoring_elements":"0.9054","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6855"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html"},{"reference_url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"},{"reference_url":"http://www.debian.org/security/2015/dsa-3361","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3361"},{"reference_url":"http://www.debian.org/security/2015/dsa-3362","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3362"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/10/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/10/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/10/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/10/2"},{"reference_url":"http://www.securityfocus.com/bid/76691","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76691"},{"reference_url":"http://www.ubuntu.com/usn/USN-2745-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2745-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260080","reference_id":"1260080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260080"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-6855","reference_id":"CVE-2015-6855","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-6855"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2745-1/","reference_id":"USN-2745-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2745-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-6855"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njfq-vdgj-wfc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60193?format=json","vulnerability_id":"VCID-p5qs-eaj5-4bax","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7549.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7549","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30264","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30171","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30193","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3079","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30746","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30496","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30165","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30237","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30245","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/14/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/14/2"},{"reference_url":"http://www.securityfocus.com/bid/80761","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/80761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291137","reference_id":"1291137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1291137"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808131","reference_id":"808131","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808131"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7549","reference_id":"CVE-2015-7549","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7549"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-7549"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5qs-eaj5-4bax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60200?format=json","vulnerability_id":"VCID-prnz-8kk8-fkhj","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8666.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8666.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8666","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23337","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23258","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23427","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23404","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23475","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23501","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23463","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23455","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23229","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23118","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23202","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23278","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23242","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8666"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/24/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/24/1"},{"reference_url":"http://www.securityfocus.com/bid/79670","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79670"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1283722","reference_id":"1283722","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1283722"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8666","reference_id":"CVE-2015-8666","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:P"},{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8666"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8666"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prnz-8kk8-fkhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60198?format=json","vulnerability_id":"VCID-rwea-a658-bfbm","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8567.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8567.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8567","reference_id":"","reference_type":"","scores":[{"value":"0.03411","scoring_system":"epss","scoring_elements":"0.87562","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87623","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87707","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87704","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87717","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87591","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87631","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87568","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87638","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87659","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87658","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87673","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03508","scoring_system":"epss","scoring_elements":"0.87689","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/15/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/15/10"},{"reference_url":"http://www.securityfocus.com/bid/79721","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/79721"},{"reference_url":"http://www.ubuntu.com/usn/USN-2891-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2891-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289816","reference_id":"1289816","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289816"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145","reference_id":"808145","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8567","reference_id":"CVE-2015-8567","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:C"},{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8567"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8567"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rwea-a658-bfbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60186?format=json","vulnerability_id":"VCID-ucq7-rbw9-efc2","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5278.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5278","reference_id":"","reference_type":"","scores":[{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82703","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82725","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82746","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82744","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82759","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01761","scoring_system":"epss","scoring_elements":"0.82799","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83014","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.8301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.8305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82972","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.82997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.83004","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01853","scoring_system":"epss","scoring_elements":"0.8302","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256661","reference_id":"1256661","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256661"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799073","reference_id":"799073","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799073"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2745-1/","reference_id":"USN-2745-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2745-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-5278"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucq7-rbw9-efc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60191?format=json","vulnerability_id":"VCID-vgar-q6tq-ufc5","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7295.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7295.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7295","reference_id":"","reference_type":"","scores":[{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87868","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.8769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87753","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87758","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87774","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87781","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87778","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87825","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87822","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03583","scoring_system":"epss","scoring_elements":"0.87837","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/18/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/18/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/09/18/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/09/18/9"},{"reference_url":"http://www.securityfocus.com/bid/82672","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82672"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1264381","reference_id":"1264381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1264381"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799452","reference_id":"799452","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799452"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7295","reference_id":"CVE-2015-7295","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7295"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2828-1/","reference_id":"USN-2828-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2828-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-7295"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vgar-q6tq-ufc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60195?format=json","vulnerability_id":"VCID-wj3c-7a67-ffd1","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8","reference_id":"","reference_type":"","scores":[],"url":"http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8504.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8504.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8504","reference_id":"","reference_type":"","scores":[{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86291","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86253","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86084","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86099","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.8613","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86143","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86139","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86174","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86184","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86183","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86203","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86224","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02814","scoring_system":"epss","scoring_elements":"0.8624","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"http://www.debian.org/security/2016/dsa-3469","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3469"},{"reference_url":"http://www.debian.org/security/2016/dsa-3470","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3470"},{"reference_url":"http://www.debian.org/security/2016/dsa-3471","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3471"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/12/08/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/12/08/7"},{"reference_url":"http://www.securityfocus.com/bid/78708","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/78708"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289541","reference_id":"1289541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1289541"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130","reference_id":"808130","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8504","reference_id":"CVE-2015-8504","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8504"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8504"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wj3c-7a67-ffd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60201?format=json","vulnerability_id":"VCID-x6sp-admm-2bb4","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8701.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8701","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21385","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21441","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21408","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21261","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21259","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21205","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21293","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2127","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21291","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21369","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8701"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1286971","reference_id":"1286971","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1286971"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809313","reference_id":"809313","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809313"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8701"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6sp-admm-2bb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60204?format=json","vulnerability_id":"VCID-zdcz-c2h2-dfde","summary":"Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8745.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8745","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2096","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21021","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20944","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21084","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21102","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21058","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21006","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20843","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20874","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20848","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2087","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1270876","reference_id":"1270876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1270876"},{"reference_url":"https://security.gentoo.org/glsa/201602-01","reference_id":"GLSA-201602-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-01"},{"reference_url":"https://usn.ubuntu.com/2891-1/","reference_id":"USN-2891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84819?format=json","purl":"pkg:ebuild/app-emulation/qemu@2.5.0-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}],"aliases":["CVE-2015-8745"],"risk_score":0.4,"exploitability":"0.5","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zdcz-c2h2-dfde"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"}