Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/qemu@5.1.0-r1
Typeebuild
Namespaceapp-emulation
Nameqemu
Version5.1.0-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.0.0
Latest_non_vulnerable_version8.0.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-14d3-jbv3-xbbe
vulnerability_id VCID-14d3-jbv3-xbbe
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10761.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10761
reference_id
reference_type
scores
0
value 0.00841
scoring_system epss
scoring_elements 0.74672
published_at 2026-04-01T12:55:00Z
1
value 0.00841
scoring_system epss
scoring_elements 0.74675
published_at 2026-04-02T12:55:00Z
2
value 0.00841
scoring_system epss
scoring_elements 0.74701
published_at 2026-04-04T12:55:00Z
3
value 0.00841
scoring_system epss
scoring_elements 0.74676
published_at 2026-04-07T12:55:00Z
4
value 0.00841
scoring_system epss
scoring_elements 0.74708
published_at 2026-04-08T12:55:00Z
5
value 0.00841
scoring_system epss
scoring_elements 0.74723
published_at 2026-04-09T12:55:00Z
6
value 0.00841
scoring_system epss
scoring_elements 0.74746
published_at 2026-04-11T12:55:00Z
7
value 0.00841
scoring_system epss
scoring_elements 0.74725
published_at 2026-04-12T12:55:00Z
8
value 0.00841
scoring_system epss
scoring_elements 0.74716
published_at 2026-04-13T12:55:00Z
9
value 0.00841
scoring_system epss
scoring_elements 0.74753
published_at 2026-04-16T12:55:00Z
10
value 0.00841
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-18T12:55:00Z
11
value 0.00841
scoring_system epss
scoring_elements 0.74751
published_at 2026-04-21T12:55:00Z
12
value 0.00841
scoring_system epss
scoring_elements 0.74786
published_at 2026-04-24T12:55:00Z
13
value 0.00841
scoring_system epss
scoring_elements 0.74793
published_at 2026-04-26T12:55:00Z
14
value 0.00841
scoring_system epss
scoring_elements 0.74796
published_at 2026-04-29T12:55:00Z
15
value 0.00841
scoring_system epss
scoring_elements 0.748
published_at 2026-05-05T12:55:00Z
16
value 0.00841
scoring_system epss
scoring_elements 0.74831
published_at 2026-05-07T12:55:00Z
17
value 0.00841
scoring_system epss
scoring_elements 0.74856
published_at 2026-05-09T12:55:00Z
18
value 0.00841
scoring_system epss
scoring_elements 0.74825
published_at 2026-05-11T12:55:00Z
19
value 0.00841
scoring_system epss
scoring_elements 0.74845
published_at 2026-05-12T12:55:00Z
20
value 0.00841
scoring_system epss
scoring_elements 0.74899
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843707
reference_id 1843707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843707
5
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
6
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-10761
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-14d3-jbv3-xbbe
1
url VCID-4d66-e766-q7ch
vulnerability_id VCID-4d66-e766-q7ch
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13253.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13253.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13253
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.30378
published_at 2026-04-01T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.30408
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30453
published_at 2026-04-04T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30261
published_at 2026-04-07T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30321
published_at 2026-04-08T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30355
published_at 2026-04-09T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30358
published_at 2026-04-11T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30314
published_at 2026-04-12T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30266
published_at 2026-04-13T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.30281
published_at 2026-04-16T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30263
published_at 2026-04-18T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30219
published_at 2026-04-21T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30154
published_at 2026-04-24T12:55:00Z
13
value 0.00116
scoring_system epss
scoring_elements 0.30038
published_at 2026-04-26T12:55:00Z
14
value 0.00116
scoring_system epss
scoring_elements 0.29964
published_at 2026-04-29T12:55:00Z
15
value 0.00116
scoring_system epss
scoring_elements 0.29829
published_at 2026-05-05T12:55:00Z
16
value 0.00116
scoring_system epss
scoring_elements 0.299
published_at 2026-05-07T12:55:00Z
17
value 0.00116
scoring_system epss
scoring_elements 0.2991
published_at 2026-05-09T12:55:00Z
18
value 0.00116
scoring_system epss
scoring_elements 0.2984
published_at 2026-05-11T12:55:00Z
19
value 0.00116
scoring_system epss
scoring_elements 0.2986
published_at 2026-05-12T12:55:00Z
20
value 0.00116
scoring_system epss
scoring_elements 0.29935
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13253
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13253
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13253
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1838546
reference_id 1838546
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1838546
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961297
reference_id 961297
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961297
6
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
7
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
8
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13253
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d66-e766-q7ch
2
url VCID-6ef4-c38a-j7ca
vulnerability_id VCID-6ef4-c38a-j7ca
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13362.json
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13362
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26973
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2705
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26956
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26916
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26859
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26871
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26842
published_at 2026-04-18T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-21T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-24T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-26T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26667
published_at 2026-04-29T12:55:00Z
15
value 0.00098
scoring_system epss
scoring_elements 0.26534
published_at 2026-05-05T12:55:00Z
16
value 0.00098
scoring_system epss
scoring_elements 0.26603
published_at 2026-05-12T12:55:00Z
17
value 0.00098
scoring_system epss
scoring_elements 0.26659
published_at 2026-05-09T12:55:00Z
18
value 0.00098
scoring_system epss
scoring_elements 0.26586
published_at 2026-05-11T12:55:00Z
19
value 0.00098
scoring_system epss
scoring_elements 0.26684
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1840999
reference_id 1840999
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1840999
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961887
reference_id 961887
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961887
11
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
12
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
13
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13362
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ef4-c38a-j7ca
3
url VCID-6hqu-ecs5-zqeb
vulnerability_id VCID-6hqu-ecs5-zqeb
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13361.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13361
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26973
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27014
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.2705
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26841
published_at 2026-04-07T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26909
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26956
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26916
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26859
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26871
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26842
published_at 2026-04-18T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26803
published_at 2026-04-21T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26745
published_at 2026-04-24T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26737
published_at 2026-04-26T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26667
published_at 2026-04-29T12:55:00Z
15
value 0.00098
scoring_system epss
scoring_elements 0.26534
published_at 2026-05-05T12:55:00Z
16
value 0.00098
scoring_system epss
scoring_elements 0.26603
published_at 2026-05-12T12:55:00Z
17
value 0.00098
scoring_system epss
scoring_elements 0.26659
published_at 2026-05-09T12:55:00Z
18
value 0.00098
scoring_system epss
scoring_elements 0.26586
published_at 2026-05-11T12:55:00Z
19
value 0.00098
scoring_system epss
scoring_elements 0.26684
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1840980
reference_id 1840980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1840980
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961888
reference_id 961888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961888
11
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
12
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
13
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13361
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6hqu-ecs5-zqeb
4
url VCID-dqbd-gqg9-2kgs
vulnerability_id VCID-dqbd-gqg9-2kgs
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13754.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13754
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08657
published_at 2026-04-01T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08685
published_at 2026-04-02T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08733
published_at 2026-04-08T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08656
published_at 2026-04-07T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08757
published_at 2026-04-11T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08735
published_at 2026-04-12T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.0872
published_at 2026-04-13T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.0861
published_at 2026-04-16T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.08597
published_at 2026-04-18T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08751
published_at 2026-04-21T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08762
published_at 2026-04-24T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08716
published_at 2026-04-26T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08721
published_at 2026-04-29T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08651
published_at 2026-05-05T12:55:00Z
14
value 0.00031
scoring_system epss
scoring_elements 0.08794
published_at 2026-05-07T12:55:00Z
15
value 0.00031
scoring_system epss
scoring_elements 0.08879
published_at 2026-05-09T12:55:00Z
16
value 0.00031
scoring_system epss
scoring_elements 0.08844
published_at 2026-05-11T12:55:00Z
17
value 0.00031
scoring_system epss
scoring_elements 0.08871
published_at 2026-05-12T12:55:00Z
18
value 0.00031
scoring_system epss
scoring_elements 0.0893
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1842363
reference_id 1842363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1842363
10
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
11
reference_url https://access.redhat.com/errata/RHSA-2021:2521
reference_id RHSA-2021:2521
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2521
12
reference_url https://access.redhat.com/errata/RHSA-2021:3061
reference_id RHSA-2021:3061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3061
13
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
14
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13754
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqbd-gqg9-2kgs
5
url VCID-ezm8-pq4d-mkhg
vulnerability_id VCID-ezm8-pq4d-mkhg
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13800.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13800
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28466
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28561
published_at 2026-04-02T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28604
published_at 2026-04-04T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28407
published_at 2026-04-07T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28515
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28517
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28425
published_at 2026-04-13T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28442
published_at 2026-04-16T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28419
published_at 2026-04-18T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28368
published_at 2026-04-21T12:55:00Z
11
value 0.00104
scoring_system epss
scoring_elements 0.28243
published_at 2026-04-24T12:55:00Z
12
value 0.00104
scoring_system epss
scoring_elements 0.28131
published_at 2026-04-26T12:55:00Z
13
value 0.00104
scoring_system epss
scoring_elements 0.28051
published_at 2026-04-29T12:55:00Z
14
value 0.00104
scoring_system epss
scoring_elements 0.27893
published_at 2026-05-05T12:55:00Z
15
value 0.00104
scoring_system epss
scoring_elements 0.27955
published_at 2026-05-07T12:55:00Z
16
value 0.00104
scoring_system epss
scoring_elements 0.27981
published_at 2026-05-09T12:55:00Z
17
value 0.00104
scoring_system epss
scoring_elements 0.27896
published_at 2026-05-11T12:55:00Z
18
value 0.00104
scoring_system epss
scoring_elements 0.27916
published_at 2026-05-12T12:55:00Z
19
value 0.00104
scoring_system epss
scoring_elements 0.2799
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843771
reference_id 1843771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843771
5
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
6
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13800
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezm8-pq4d-mkhg
6
url VCID-sy57-hngf-d3gn
vulnerability_id VCID-sy57-hngf-d3gn
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13791.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13791.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13791
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.36554
published_at 2026-05-14T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36541
published_at 2026-05-09T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.36457
published_at 2026-05-11T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.3648
published_at 2026-05-12T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38702
published_at 2026-04-11T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38683
published_at 2026-04-08T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38692
published_at 2026-04-09T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38664
published_at 2026-04-18T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38638
published_at 2026-04-13T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38686
published_at 2026-04-16T12:55:00Z
10
value 0.00173
scoring_system epss
scoring_elements 0.38586
published_at 2026-04-21T12:55:00Z
11
value 0.00173
scoring_system epss
scoring_elements 0.38433
published_at 2026-04-24T12:55:00Z
12
value 0.00173
scoring_system epss
scoring_elements 0.38408
published_at 2026-04-26T12:55:00Z
13
value 0.00173
scoring_system epss
scoring_elements 0.38316
published_at 2026-04-29T12:55:00Z
14
value 0.00173
scoring_system epss
scoring_elements 0.38197
published_at 2026-05-05T12:55:00Z
15
value 0.00173
scoring_system epss
scoring_elements 0.38265
published_at 2026-05-07T12:55:00Z
16
value 0.00173
scoring_system epss
scoring_elements 0.3855
published_at 2026-04-01T12:55:00Z
17
value 0.00173
scoring_system epss
scoring_elements 0.38632
published_at 2026-04-07T12:55:00Z
18
value 0.00173
scoring_system epss
scoring_elements 0.3868
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13791
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13791
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843764
reference_id 1843764
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843764
5
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13791
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy57-hngf-d3gn
7
url VCID-wg5b-8smu-b3fm
vulnerability_id VCID-wg5b-8smu-b3fm
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10717.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10717
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37232
published_at 2026-04-01T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37397
published_at 2026-04-02T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37421
published_at 2026-04-04T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37249
published_at 2026-04-07T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.373
published_at 2026-04-08T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37312
published_at 2026-04-09T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37323
published_at 2026-04-11T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.3729
published_at 2026-04-12T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37262
published_at 2026-04-13T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37309
published_at 2026-04-16T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37291
published_at 2026-04-18T12:55:00Z
11
value 0.00163
scoring_system epss
scoring_elements 0.37238
published_at 2026-04-21T12:55:00Z
12
value 0.00163
scoring_system epss
scoring_elements 0.37014
published_at 2026-04-24T12:55:00Z
13
value 0.00163
scoring_system epss
scoring_elements 0.36982
published_at 2026-04-26T12:55:00Z
14
value 0.00163
scoring_system epss
scoring_elements 0.36897
published_at 2026-04-29T12:55:00Z
15
value 0.00163
scoring_system epss
scoring_elements 0.36779
published_at 2026-05-05T12:55:00Z
16
value 0.00163
scoring_system epss
scoring_elements 0.36845
published_at 2026-05-07T12:55:00Z
17
value 0.00163
scoring_system epss
scoring_elements 0.36866
published_at 2026-05-09T12:55:00Z
18
value 0.00163
scoring_system epss
scoring_elements 0.3679
published_at 2026-05-11T12:55:00Z
19
value 0.00163
scoring_system epss
scoring_elements 0.36812
published_at 2026-05-12T12:55:00Z
20
value 0.00163
scoring_system epss
scoring_elements 0.36888
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10717
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1827808
reference_id 1827808
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1827808
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959746
reference_id 959746
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959746
6
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-10717
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wg5b-8smu-b3fm
8
url VCID-wm9d-ymbb-sfdc
vulnerability_id VCID-wm9d-ymbb-sfdc
summary QEMU: usb: out-of-bounds r/w access issue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14364.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14364
reference_id
reference_type
scores
0
value 0.12887
scoring_system epss
scoring_elements 0.94125
published_at 2026-05-14T12:55:00Z
1
value 0.12887
scoring_system epss
scoring_elements 0.94109
published_at 2026-05-11T12:55:00Z
2
value 0.12887
scoring_system epss
scoring_elements 0.94113
published_at 2026-05-12T12:55:00Z
3
value 0.13188
scoring_system epss
scoring_elements 0.94183
published_at 2026-05-09T12:55:00Z
4
value 0.13188
scoring_system epss
scoring_elements 0.9416
published_at 2026-05-05T12:55:00Z
5
value 0.13188
scoring_system epss
scoring_elements 0.94171
published_at 2026-05-07T12:55:00Z
6
value 0.13903
scoring_system epss
scoring_elements 0.94304
published_at 2026-04-09T12:55:00Z
7
value 0.13903
scoring_system epss
scoring_elements 0.94308
published_at 2026-04-12T12:55:00Z
8
value 0.13903
scoring_system epss
scoring_elements 0.94309
published_at 2026-04-13T12:55:00Z
9
value 0.13903
scoring_system epss
scoring_elements 0.94324
published_at 2026-04-16T12:55:00Z
10
value 0.13903
scoring_system epss
scoring_elements 0.9433
published_at 2026-04-18T12:55:00Z
11
value 0.13903
scoring_system epss
scoring_elements 0.94329
published_at 2026-04-21T12:55:00Z
12
value 0.13903
scoring_system epss
scoring_elements 0.94333
published_at 2026-04-24T12:55:00Z
13
value 0.13903
scoring_system epss
scoring_elements 0.94332
published_at 2026-04-26T12:55:00Z
14
value 0.13903
scoring_system epss
scoring_elements 0.94277
published_at 2026-04-02T12:55:00Z
15
value 0.13903
scoring_system epss
scoring_elements 0.9429
published_at 2026-04-07T12:55:00Z
16
value 0.13903
scoring_system epss
scoring_elements 0.94299
published_at 2026-04-08T12:55:00Z
17
value 0.13903
scoring_system epss
scoring_elements 0.94268
published_at 2026-04-01T12:55:00Z
18
value 0.13903
scoring_system epss
scoring_elements 0.94289
published_at 2026-04-04T12:55:00Z
19
value 0.14223
scoring_system epss
scoring_elements 0.94409
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1869201
reference_id 1869201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1869201
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968947
reference_id 968947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968947
9
reference_url https://security.gentoo.org/glsa/202009-14
reference_id GLSA-202009-14
reference_type
scores
url https://security.gentoo.org/glsa/202009-14
10
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
11
reference_url https://access.redhat.com/errata/RHSA-2020:4047
reference_id RHSA-2020:4047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4047
12
reference_url https://access.redhat.com/errata/RHSA-2020:4048
reference_id RHSA-2020:4048
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4048
13
reference_url https://access.redhat.com/errata/RHSA-2020:4049
reference_id RHSA-2020:4049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4049
14
reference_url https://access.redhat.com/errata/RHSA-2020:4050
reference_id RHSA-2020:4050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4050
15
reference_url https://access.redhat.com/errata/RHSA-2020:4051
reference_id RHSA-2020:4051
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4051
16
reference_url https://access.redhat.com/errata/RHSA-2020:4052
reference_id RHSA-2020:4052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4052
17
reference_url https://access.redhat.com/errata/RHSA-2020:4053
reference_id RHSA-2020:4053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4053
18
reference_url https://access.redhat.com/errata/RHSA-2020:4054
reference_id RHSA-2020:4054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4054
19
reference_url https://access.redhat.com/errata/RHSA-2020:4055
reference_id RHSA-2020:4055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4055
20
reference_url https://access.redhat.com/errata/RHSA-2020:4056
reference_id RHSA-2020:4056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4056
21
reference_url https://access.redhat.com/errata/RHSA-2020:4058
reference_id RHSA-2020:4058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4058
22
reference_url https://access.redhat.com/errata/RHSA-2020:4059
reference_id RHSA-2020:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4059
23
reference_url https://access.redhat.com/errata/RHSA-2020:4078
reference_id RHSA-2020:4078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4078
24
reference_url https://access.redhat.com/errata/RHSA-2020:4079
reference_id RHSA-2020:4079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4079
25
reference_url https://access.redhat.com/errata/RHSA-2020:4111
reference_id RHSA-2020:4111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4111
26
reference_url https://access.redhat.com/errata/RHSA-2020:4115
reference_id RHSA-2020:4115
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4115
27
reference_url https://access.redhat.com/errata/RHSA-2020:4162
reference_id RHSA-2020:4162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4162
28
reference_url https://access.redhat.com/errata/RHSA-2020:4167
reference_id RHSA-2020:4167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4167
29
reference_url https://access.redhat.com/errata/RHSA-2020:4172
reference_id RHSA-2020:4172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4172
30
reference_url https://access.redhat.com/errata/RHSA-2020:4176
reference_id RHSA-2020:4176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4176
31
reference_url https://access.redhat.com/errata/RHSA-2020:4290
reference_id RHSA-2020:4290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4290
32
reference_url https://access.redhat.com/errata/RHSA-2020:4291
reference_id RHSA-2020:4291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4291
33
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
34
reference_url https://usn.ubuntu.com/4511-1/
reference_id USN-4511-1
reference_type
scores
url https://usn.ubuntu.com/4511-1/
35
reference_url https://xenbits.xen.org/xsa/advisory-335.html
reference_id XSA-335
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-335.html
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-14364, XSA-335
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wm9d-ymbb-sfdc
9
url VCID-zk4y-2xjp-vfcs
vulnerability_id VCID-zk4y-2xjp-vfcs
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13659.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13659
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10798
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.10933
published_at 2026-05-12T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.10999
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.10823
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10898
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10951
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.10952
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10919
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10896
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10761
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10774
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10895
published_at 2026-04-21T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10854
published_at 2026-04-24T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10813
published_at 2026-04-26T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-29T12:55:00Z
15
value 0.00037
scoring_system epss
scoring_elements 0.10696
published_at 2026-05-05T12:55:00Z
16
value 0.00037
scoring_system epss
scoring_elements 0.10831
published_at 2026-05-07T12:55:00Z
17
value 0.00037
scoring_system epss
scoring_elements 0.10902
published_at 2026-05-09T12:55:00Z
18
value 0.00037
scoring_system epss
scoring_elements 0.10888
published_at 2026-05-11T12:55:00Z
19
value 0.00037
scoring_system epss
scoring_elements 0.10985
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13754
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1842496
reference_id 1842496
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1842496
10
reference_url https://security.gentoo.org/glsa/202011-09
reference_id GLSA-202011-09
reference_type
scores
url https://security.gentoo.org/glsa/202011-09
11
reference_url https://usn.ubuntu.com/4467-1/
reference_id USN-4467-1
reference_type
scores
url https://usn.ubuntu.com/4467-1/
12
reference_url https://usn.ubuntu.com/4467-2/
reference_id USN-4467-2
reference_type
scores
url https://usn.ubuntu.com/4467-2/
fixed_packages
0
url pkg:ebuild/app-emulation/qemu@5.1.0-r1
purl pkg:ebuild/app-emulation/qemu@5.1.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1
aliases CVE-2020-13659
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zk4y-2xjp-vfcs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@5.1.0-r1