Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
Typedeb
Namespacedebian
Nameqemu
Version1:2.6+dfsg-3.1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:2.7+dfsg-1
Latest_non_vulnerable_version1:11.0.0+ds-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4s6a-mart-pba2
vulnerability_id VCID-4s6a-mart-pba2
summary virtio: unbounded memory allocation issue
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-1585.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1585.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-1586.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1586.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-1606.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1606.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-1607.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1607.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2016-1652.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1652.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2016-1653.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1653.html
6
reference_url http://rhn.redhat.com/errata/RHSA-2016-1654.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1654.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1655.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1655.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2016-1756.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1756.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2016-1763.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1763.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2016-1943.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1943.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5403.json
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5403.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5403
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21975
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21951
published_at 2026-05-15T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21826
published_at 2026-05-11T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21849
published_at 2026-05-12T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21932
published_at 2026-05-14T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22133
published_at 2026-04-02T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22182
published_at 2026-04-04T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21966
published_at 2026-04-07T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-08T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22102
published_at 2026-04-09T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.2212
published_at 2026-04-11T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.22079
published_at 2026-04-12T12:55:00Z
12
value 0.00072
scoring_system epss
scoring_elements 0.22018
published_at 2026-04-13T12:55:00Z
13
value 0.00072
scoring_system epss
scoring_elements 0.22016
published_at 2026-04-16T12:55:00Z
14
value 0.00072
scoring_system epss
scoring_elements 0.2201
published_at 2026-04-18T12:55:00Z
15
value 0.00072
scoring_system epss
scoring_elements 0.21964
published_at 2026-04-21T12:55:00Z
16
value 0.00072
scoring_system epss
scoring_elements 0.21825
published_at 2026-04-24T12:55:00Z
17
value 0.00072
scoring_system epss
scoring_elements 0.21813
published_at 2026-04-26T12:55:00Z
18
value 0.00072
scoring_system epss
scoring_elements 0.218
published_at 2026-04-29T12:55:00Z
19
value 0.00072
scoring_system epss
scoring_elements 0.21707
published_at 2026-05-05T12:55:00Z
20
value 0.00072
scoring_system epss
scoring_elements 0.21779
published_at 2026-05-07T12:55:00Z
21
value 0.00072
scoring_system epss
scoring_elements 0.21855
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5403
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00021.html
16
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
17
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
18
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
19
reference_url http://www.securityfocus.com/bid/92148
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/92148
20
reference_url http://www.securitytracker.com/id/1036476
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036476
21
reference_url http://www.ubuntu.com/usn/USN-3047-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-1
22
reference_url http://www.ubuntu.com/usn/USN-3047-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3047-2
23
reference_url http://xenbits.xen.org/xsa/advisory-184.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-184.html
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358359
reference_id 1358359
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358359
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832619
reference_id 832619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832619
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.7.0:rc0:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:x86:*
reference_id cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:x86:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-5403
reference_id CVE-2016-5403
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-5403
65
reference_url https://access.redhat.com/errata/RHSA-2016:1585
reference_id RHSA-2016:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1585
66
reference_url https://access.redhat.com/errata/RHSA-2016:1586
reference_id RHSA-2016:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1586
67
reference_url https://access.redhat.com/errata/RHSA-2016:1606
reference_id RHSA-2016:1606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1606
68
reference_url https://access.redhat.com/errata/RHSA-2016:1607
reference_id RHSA-2016:1607
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1607
69
reference_url https://access.redhat.com/errata/RHSA-2016:1652
reference_id RHSA-2016:1652
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1652
70
reference_url https://access.redhat.com/errata/RHSA-2016:1653
reference_id RHSA-2016:1653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1653
71
reference_url https://access.redhat.com/errata/RHSA-2016:1654
reference_id RHSA-2016:1654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1654
72
reference_url https://access.redhat.com/errata/RHSA-2016:1655
reference_id RHSA-2016:1655
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1655
73
reference_url https://access.redhat.com/errata/RHSA-2016:1756
reference_id RHSA-2016:1756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1756
74
reference_url https://access.redhat.com/errata/RHSA-2016:1763
reference_id RHSA-2016:1763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1763
75
reference_url https://access.redhat.com/errata/RHSA-2016:1943
reference_id RHSA-2016:1943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1943
76
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
77
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
78
reference_url https://xenbits.xen.org/xsa/advisory-184.html
reference_id XSA-184
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-184.html
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-5403, XSA-184
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4s6a-mart-pba2
1
url VCID-6me7-srq7-6bfd
vulnerability_id VCID-6me7-srq7-6bfd
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7116.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7116
reference_id
reference_type
scores
0
value 0.00861
scoring_system epss
scoring_elements 0.74999
published_at 2026-04-01T12:55:00Z
1
value 0.00861
scoring_system epss
scoring_elements 0.75002
published_at 2026-04-02T12:55:00Z
2
value 0.00861
scoring_system epss
scoring_elements 0.75031
published_at 2026-04-04T12:55:00Z
3
value 0.00861
scoring_system epss
scoring_elements 0.75007
published_at 2026-04-07T12:55:00Z
4
value 0.00861
scoring_system epss
scoring_elements 0.75041
published_at 2026-04-08T12:55:00Z
5
value 0.00861
scoring_system epss
scoring_elements 0.75053
published_at 2026-04-09T12:55:00Z
6
value 0.00861
scoring_system epss
scoring_elements 0.75075
published_at 2026-04-11T12:55:00Z
7
value 0.00861
scoring_system epss
scoring_elements 0.75054
published_at 2026-04-12T12:55:00Z
8
value 0.00861
scoring_system epss
scoring_elements 0.75043
published_at 2026-04-13T12:55:00Z
9
value 0.00861
scoring_system epss
scoring_elements 0.7508
published_at 2026-04-16T12:55:00Z
10
value 0.00861
scoring_system epss
scoring_elements 0.75088
published_at 2026-04-18T12:55:00Z
11
value 0.00861
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-21T12:55:00Z
12
value 0.00861
scoring_system epss
scoring_elements 0.75116
published_at 2026-04-24T12:55:00Z
13
value 0.00861
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-26T12:55:00Z
14
value 0.00861
scoring_system epss
scoring_elements 0.75124
published_at 2026-04-29T12:55:00Z
15
value 0.00861
scoring_system epss
scoring_elements 0.75133
published_at 2026-05-05T12:55:00Z
16
value 0.00861
scoring_system epss
scoring_elements 0.7516
published_at 2026-05-07T12:55:00Z
17
value 0.00861
scoring_system epss
scoring_elements 0.75184
published_at 2026-05-09T12:55:00Z
18
value 0.00861
scoring_system epss
scoring_elements 0.75165
published_at 2026-05-11T12:55:00Z
19
value 0.00861
scoring_system epss
scoring_elements 0.75174
published_at 2026-05-12T12:55:00Z
20
value 0.00861
scoring_system epss
scoring_elements 0.75227
published_at 2026-05-14T12:55:00Z
21
value 0.00861
scoring_system epss
scoring_elements 0.75232
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1346349
reference_id 1346349
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1346349
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836502
reference_id 836502
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836502
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-7116
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6me7-srq7-6bfd
2
url VCID-999y-j12v-97eu
vulnerability_id VCID-999y-j12v-97eu
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6888.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6888
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27057
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27097
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27133
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26925
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26993
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27039
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27042
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26998
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.26941
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26951
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.2689
published_at 2026-04-21T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26842
published_at 2026-04-24T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26835
published_at 2026-04-26T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26769
published_at 2026-04-29T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26621
published_at 2026-05-05T12:55:00Z
15
value 0.00098
scoring_system epss
scoring_elements 0.26689
published_at 2026-05-07T12:55:00Z
16
value 0.00098
scoring_system epss
scoring_elements 0.26737
published_at 2026-05-09T12:55:00Z
17
value 0.00098
scoring_system epss
scoring_elements 0.2666
published_at 2026-05-11T12:55:00Z
18
value 0.00098
scoring_system epss
scoring_elements 0.26678
published_at 2026-05-12T12:55:00Z
19
value 0.00098
scoring_system epss
scoring_elements 0.2676
published_at 2026-05-14T12:55:00Z
20
value 0.00098
scoring_system epss
scoring_elements 0.26785
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1369031
reference_id 1369031
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1369031
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834902
reference_id 834902
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834902
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://access.redhat.com/errata/RHSA-2017:2392
reference_id RHSA-2017:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2392
8
reference_url https://access.redhat.com/errata/RHSA-2017:2408
reference_id RHSA-2017:2408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2408
9
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6888
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-999y-j12v-97eu
3
url VCID-a243-xqn6-2ugc
vulnerability_id VCID-a243-xqn6-2ugc
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6490.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6490
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22469
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22644
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22687
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22477
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22558
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22629
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22533
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22547
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22542
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22491
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22337
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22326
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22324
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22226
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22309
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22387
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22356
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22372
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.22452
published_at 2026-05-14T12:55:00Z
21
value 0.00075
scoring_system epss
scoring_elements 0.22472
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1361427
reference_id 1361427
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1361427
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832767
reference_id 832767
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832767
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6490
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a243-xqn6-2ugc
4
url VCID-a4jx-4hpe-3kcy
vulnerability_id VCID-a4jx-4hpe-3kcy
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6834.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6834
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29517
published_at 2026-04-08T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29584
published_at 2026-04-02T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29633
published_at 2026-04-04T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-07T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29557
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29559
published_at 2026-04-11T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29514
published_at 2026-04-12T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-13T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29481
published_at 2026-04-16T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29453
published_at 2026-04-18T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29407
published_at 2026-04-21T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29291
published_at 2026-04-24T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29179
published_at 2026-04-26T12:55:00Z
13
value 0.00111
scoring_system epss
scoring_elements 0.29113
published_at 2026-04-29T12:55:00Z
14
value 0.00111
scoring_system epss
scoring_elements 0.28965
published_at 2026-05-11T12:55:00Z
15
value 0.00111
scoring_system epss
scoring_elements 0.29027
published_at 2026-05-07T12:55:00Z
16
value 0.00111
scoring_system epss
scoring_elements 0.29042
published_at 2026-05-09T12:55:00Z
17
value 0.00111
scoring_system epss
scoring_elements 0.28985
published_at 2026-05-12T12:55:00Z
18
value 0.00111
scoring_system epss
scoring_elements 0.29067
published_at 2026-05-14T12:55:00Z
19
value 0.00111
scoring_system epss
scoring_elements 0.29077
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1368990
reference_id 1368990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1368990
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834905
reference_id 834905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834905
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6834
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4jx-4hpe-3kcy
5
url VCID-ae2t-gh49-a7ea
vulnerability_id VCID-ae2t-gh49-a7ea
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6836.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6836
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22498
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22672
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22716
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22506
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22585
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.2264
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22657
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22616
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22561
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22575
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.2257
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22519
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22366
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22357
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22355
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22257
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22418
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22388
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22404
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-05-14T12:55:00Z
21
value 0.00075
scoring_system epss
scoring_elements 0.225
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1366369
reference_id 1366369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1366369
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834944
reference_id 834944
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834944
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6836
risk_score 1.1
exploitability 0.5
weighted_severity 2.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae2t-gh49-a7ea
6
url VCID-fuec-b5hj-s3e8
vulnerability_id VCID-fuec-b5hj-s3e8
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6833.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6833
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22392
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22361
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22378
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.22457
published_at 2026-05-14T12:55:00Z
21
value 0.00075
scoring_system epss
scoring_elements 0.22477
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1368980
reference_id 1368980
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1368980
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834904
reference_id 834904
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834904
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6833
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fuec-b5hj-s3e8
7
url VCID-k217-fje9-9bas
vulnerability_id VCID-k217-fje9-9bas
summary Qemu: scsi: esp: OOB write access in esp_do_dma
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6351.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6351.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6351
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37797
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37979
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.38005
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37883
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37933
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37945
published_at 2026-04-09T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37961
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37925
published_at 2026-04-18T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.379
published_at 2026-04-13T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37946
published_at 2026-04-16T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37485
published_at 2026-05-09T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37403
published_at 2026-05-11T12:55:00Z
12
value 0.00167
scoring_system epss
scoring_elements 0.37375
published_at 2026-05-12T12:55:00Z
13
value 0.00167
scoring_system epss
scoring_elements 0.37862
published_at 2026-04-21T12:55:00Z
14
value 0.00167
scoring_system epss
scoring_elements 0.37619
published_at 2026-04-24T12:55:00Z
15
value 0.00167
scoring_system epss
scoring_elements 0.37597
published_at 2026-04-26T12:55:00Z
16
value 0.00167
scoring_system epss
scoring_elements 0.37507
published_at 2026-04-29T12:55:00Z
17
value 0.00167
scoring_system epss
scoring_elements 0.37394
published_at 2026-05-05T12:55:00Z
18
value 0.00167
scoring_system epss
scoring_elements 0.37464
published_at 2026-05-07T12:55:00Z
19
value 0.00227
scoring_system epss
scoring_elements 0.45329
published_at 2026-05-15T12:55:00Z
20
value 0.00227
scoring_system epss
scoring_elements 0.45311
published_at 2026-05-14T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6351
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1360599
reference_id 1360599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1360599
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832621
reference_id 832621
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832621
6
reference_url https://usn.ubuntu.com/3047-1/
reference_id USN-3047-1
reference_type
scores
url https://usn.ubuntu.com/3047-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6351
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k217-fje9-9bas
8
url VCID-q63s-qmb1-4yd8
vulnerability_id VCID-q63s-qmb1-4yd8
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7156.json
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7156
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22392
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22361
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22378
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.22457
published_at 2026-05-14T12:55:00Z
21
value 0.00075
scoring_system epss
scoring_elements 0.22477
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373478
reference_id 1373478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373478
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837339
reference_id 837339
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837339
6
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-7156
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q63s-qmb1-4yd8
9
url VCID-uwej-s4h2-wfhv
vulnerability_id VCID-uwej-s4h2-wfhv
summary Qemu: net: vmxnet: buffer overflow in vmxnet_tx_pkt_parse_headers() in vmxnet3 device emulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6835.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6835
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21908
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.2207
published_at 2026-04-02T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22121
published_at 2026-04-04T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21896
published_at 2026-04-07T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21978
published_at 2026-04-08T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22032
published_at 2026-04-09T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22047
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22006
published_at 2026-04-12T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21947
published_at 2026-04-16T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21943
published_at 2026-04-18T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21901
published_at 2026-04-21T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.21754
published_at 2026-04-24T12:55:00Z
12
value 0.00072
scoring_system epss
scoring_elements 0.21741
published_at 2026-04-26T12:55:00Z
13
value 0.00072
scoring_system epss
scoring_elements 0.21735
published_at 2026-04-29T12:55:00Z
14
value 0.00072
scoring_system epss
scoring_elements 0.21644
published_at 2026-05-05T12:55:00Z
15
value 0.00072
scoring_system epss
scoring_elements 0.21714
published_at 2026-05-07T12:55:00Z
16
value 0.00072
scoring_system epss
scoring_elements 0.21792
published_at 2026-05-09T12:55:00Z
17
value 0.00072
scoring_system epss
scoring_elements 0.21764
published_at 2026-05-11T12:55:00Z
18
value 0.00072
scoring_system epss
scoring_elements 0.21788
published_at 2026-05-12T12:55:00Z
19
value 0.00072
scoring_system epss
scoring_elements 0.21868
published_at 2026-05-14T12:55:00Z
20
value 0.00072
scoring_system epss
scoring_elements 0.21887
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1369012
reference_id 1369012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1369012
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835031
reference_id 835031
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=835031
6
reference_url https://access.redhat.com/errata/RHSA-2017:2392
reference_id RHSA-2017:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2392
7
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-6835
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwej-s4h2-wfhv
10
url VCID-uza6-bqkx-hugw
vulnerability_id VCID-uza6-bqkx-hugw
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which could lead to arbitrary code execution, or cause a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7157.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7157.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7157
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22392
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22361
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22378
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.22457
published_at 2026-05-14T12:55:00Z
21
value 0.00075
scoring_system epss
scoring_elements 0.22477
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7157
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373504
reference_id 1373504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373504
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837603
reference_id 837603
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837603
5
reference_url https://security.gentoo.org/glsa/201609-01
reference_id GLSA-201609-01
reference_type
scores
url https://security.gentoo.org/glsa/201609-01
6
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-7157
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uza6-bqkx-hugw
11
url VCID-z6ke-rxnx-hfd9
vulnerability_id VCID-z6ke-rxnx-hfd9
summary Qemu: scsi: pvscsi: OOB read and infinite loop while setting descriptor rings
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7155.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7155.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7155
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22474
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22691
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22482
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22634
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22592
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22537
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22552
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22546
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22496
published_at 2026-04-21T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22341
published_at 2026-04-24T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22331
published_at 2026-04-26T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.22328
published_at 2026-04-29T12:55:00Z
15
value 0.00075
scoring_system epss
scoring_elements 0.22231
published_at 2026-05-05T12:55:00Z
16
value 0.00075
scoring_system epss
scoring_elements 0.22314
published_at 2026-05-07T12:55:00Z
17
value 0.00075
scoring_system epss
scoring_elements 0.22392
published_at 2026-05-09T12:55:00Z
18
value 0.00075
scoring_system epss
scoring_elements 0.22361
published_at 2026-05-11T12:55:00Z
19
value 0.00075
scoring_system epss
scoring_elements 0.22378
published_at 2026-05-12T12:55:00Z
20
value 0.00075
scoring_system epss
scoring_elements 0.22457
published_at 2026-05-14T12:55:00Z
21
value 0.00075
scoring_system epss
scoring_elements 0.22477
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7155
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373462
reference_id 1373462
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373462
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837174
reference_id 837174
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837174
6
reference_url https://usn.ubuntu.com/3125-1/
reference_id USN-3125-1
reference_type
scores
url https://usn.ubuntu.com/3125-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/qemu@1:2.6%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-cenj-mz55-jbg6
6
vulnerability VCID-d2ve-dnmj-4bbz
7
vulnerability VCID-eeqx-ehn4-g3ez
8
vulnerability VCID-ej5p-r4az-6ud2
9
vulnerability VCID-ewb7-nrtu-g7ex
10
vulnerability VCID-gc6n-kgsc-f3b6
11
vulnerability VCID-m47q-17n6-t7gg
12
vulnerability VCID-mtj9-1cns-yybw
13
vulnerability VCID-n71j-fz74-kyhf
14
vulnerability VCID-p2dz-mtns-5bb4
15
vulnerability VCID-ptty-88p4-ybe9
16
vulnerability VCID-pxjg-chmx-nkdc
17
vulnerability VCID-qh2s-apkz-sbaz
18
vulnerability VCID-t58m-9jqp-43c9
19
vulnerability VCID-t5gq-4bhn-gkej
20
vulnerability VCID-uzxc-npak-yyc4
21
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-eeqx-ehn4-g3ez
3
vulnerability VCID-hkf8-96k7-kuc9
4
vulnerability VCID-m47q-17n6-t7gg
5
vulnerability VCID-n71j-fz74-kyhf
6
vulnerability VCID-t58m-9jqp-43c9
7
vulnerability VCID-uzxc-npak-yyc4
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-b6b6-s7cj-sygh
5
vulnerability VCID-detn-3zsq-3qh7
6
vulnerability VCID-eeqx-ehn4-g3ez
7
vulnerability VCID-m47q-17n6-t7gg
8
vulnerability VCID-n71j-fz74-kyhf
9
vulnerability VCID-n9n4-prkb-f3c6
10
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-b6b6-s7cj-sygh
4
vulnerability VCID-eeqx-ehn4-g3ez
5
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
7
url pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-2%3Fdistro=trixie
aliases CVE-2016-7155
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6ke-rxnx-hfd9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.6%252Bdfsg-3.1%3Fdistro=trixie