Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
Typedeb
Namespacedebian
Nameqemu
Version1:2.12~rc3+dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:3.1+dfsg-1
Latest_non_vulnerable_version1:11.0.0+ds-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-d8cd-qgg7-fyed
vulnerability_id VCID-d8cd-qgg7-fyed
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16845
reference_id
reference_type
scores
0
value 0.02074
scoring_system epss
scoring_elements 0.83891
published_at 2026-04-01T12:55:00Z
1
value 0.02074
scoring_system epss
scoring_elements 0.84046
published_at 2026-05-05T12:55:00Z
2
value 0.02074
scoring_system epss
scoring_elements 0.83985
published_at 2026-04-21T12:55:00Z
3
value 0.02074
scoring_system epss
scoring_elements 0.84012
published_at 2026-04-24T12:55:00Z
4
value 0.02074
scoring_system epss
scoring_elements 0.84019
published_at 2026-04-26T12:55:00Z
5
value 0.02074
scoring_system epss
scoring_elements 0.84025
published_at 2026-04-29T12:55:00Z
6
value 0.02074
scoring_system epss
scoring_elements 0.83905
published_at 2026-04-02T12:55:00Z
7
value 0.02074
scoring_system epss
scoring_elements 0.83921
published_at 2026-04-04T12:55:00Z
8
value 0.02074
scoring_system epss
scoring_elements 0.83924
published_at 2026-04-07T12:55:00Z
9
value 0.02074
scoring_system epss
scoring_elements 0.83948
published_at 2026-04-08T12:55:00Z
10
value 0.02074
scoring_system epss
scoring_elements 0.83954
published_at 2026-04-09T12:55:00Z
11
value 0.02074
scoring_system epss
scoring_elements 0.8397
published_at 2026-04-11T12:55:00Z
12
value 0.02074
scoring_system epss
scoring_elements 0.83964
published_at 2026-04-12T12:55:00Z
13
value 0.02074
scoring_system epss
scoring_elements 0.8396
published_at 2026-04-13T12:55:00Z
14
value 0.02074
scoring_system epss
scoring_elements 0.83984
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
1
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
15
reference_url https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html
16
reference_url https://www.debian.org/security/2018/dsa-4213
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4213
17
reference_url http://www.securityfocus.com/bid/101923
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101923
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1514148
reference_id 1514148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1514148
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136
reference_id 882136
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16845
reference_id CVE-2017-16845
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 10.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16845
28
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
29
reference_url https://usn.ubuntu.com/3575-1/
reference_id USN-3575-1
reference_type
scores
url https://usn.ubuntu.com/3575-1/
30
reference_url https://usn.ubuntu.com/3649-1/
reference_id USN-3649-1
reference_type
scores
url https://usn.ubuntu.com/3649-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-cenj-mz55-jbg6
5
vulnerability VCID-d2ve-dnmj-4bbz
6
vulnerability VCID-ej5p-r4az-6ud2
7
vulnerability VCID-ewb7-nrtu-g7ex
8
vulnerability VCID-gc6n-kgsc-f3b6
9
vulnerability VCID-m47q-17n6-t7gg
10
vulnerability VCID-mtj9-1cns-yybw
11
vulnerability VCID-n71j-fz74-kyhf
12
vulnerability VCID-p2dz-mtns-5bb4
13
vulnerability VCID-ptty-88p4-ybe9
14
vulnerability VCID-pxjg-chmx-nkdc
15
vulnerability VCID-qh2s-apkz-sbaz
16
vulnerability VCID-t58m-9jqp-43c9
17
vulnerability VCID-t5gq-4bhn-gkej
18
vulnerability VCID-uzxc-npak-yyc4
19
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-hkf8-96k7-kuc9
3
vulnerability VCID-m47q-17n6-t7gg
4
vulnerability VCID-n71j-fz74-kyhf
5
vulnerability VCID-t58m-9jqp-43c9
6
vulnerability VCID-uzxc-npak-yyc4
7
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-detn-3zsq-3qh7
5
vulnerability VCID-m47q-17n6-t7gg
6
vulnerability VCID-n71j-fz74-kyhf
7
vulnerability VCID-n9n4-prkb-f3c6
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
aliases CVE-2017-16845
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8cd-qgg7-fyed
1
url VCID-jnxy-g6wu-8ubu
vulnerability_id VCID-jnxy-g6wu-8ubu
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json
reference_id
reference_type
scores
0
value 3.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5683
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07573
published_at 2026-04-01T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07682
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07714
published_at 2026-04-04T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07681
published_at 2026-04-07T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.0774
published_at 2026-04-08T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07759
published_at 2026-04-09T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07758
published_at 2026-04-11T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07744
published_at 2026-04-12T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08028
published_at 2026-05-05T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08117
published_at 2026-04-13T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08025
published_at 2026-04-16T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.0801
published_at 2026-04-18T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.08167
published_at 2026-04-21T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-24T12:55:00Z
14
value 0.00029
scoring_system epss
scoring_elements 0.08086
published_at 2026-04-26T12:55:00Z
15
value 0.00029
scoring_system epss
scoring_elements 0.08059
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5683
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1530356
reference_id 1530356
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1530356
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392
reference_id 887392
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392
16
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
17
reference_url https://access.redhat.com/errata/RHSA-2018:0816
reference_id RHSA-2018:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0816
18
reference_url https://access.redhat.com/errata/RHSA-2018:1104
reference_id RHSA-2018:1104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1104
19
reference_url https://access.redhat.com/errata/RHSA-2018:1113
reference_id RHSA-2018:1113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1113
20
reference_url https://access.redhat.com/errata/RHSA-2018:2162
reference_id RHSA-2018:2162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2162
21
reference_url https://usn.ubuntu.com/3575-1/
reference_id USN-3575-1
reference_type
scores
url https://usn.ubuntu.com/3575-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-cenj-mz55-jbg6
5
vulnerability VCID-d2ve-dnmj-4bbz
6
vulnerability VCID-ej5p-r4az-6ud2
7
vulnerability VCID-ewb7-nrtu-g7ex
8
vulnerability VCID-gc6n-kgsc-f3b6
9
vulnerability VCID-m47q-17n6-t7gg
10
vulnerability VCID-mtj9-1cns-yybw
11
vulnerability VCID-n71j-fz74-kyhf
12
vulnerability VCID-p2dz-mtns-5bb4
13
vulnerability VCID-ptty-88p4-ybe9
14
vulnerability VCID-pxjg-chmx-nkdc
15
vulnerability VCID-qh2s-apkz-sbaz
16
vulnerability VCID-t58m-9jqp-43c9
17
vulnerability VCID-t5gq-4bhn-gkej
18
vulnerability VCID-uzxc-npak-yyc4
19
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-hkf8-96k7-kuc9
3
vulnerability VCID-m47q-17n6-t7gg
4
vulnerability VCID-n71j-fz74-kyhf
5
vulnerability VCID-t58m-9jqp-43c9
6
vulnerability VCID-uzxc-npak-yyc4
7
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-detn-3zsq-3qh7
5
vulnerability VCID-m47q-17n6-t7gg
6
vulnerability VCID-n71j-fz74-kyhf
7
vulnerability VCID-n9n4-prkb-f3c6
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
aliases CVE-2018-5683
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnxy-g6wu-8ubu
2
url VCID-jq6v-ra9m-sqgz
vulnerability_id VCID-jq6v-ra9m-sqgz
summary QEMU: cirrus: OOB access when updating VGA display
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7858.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7858.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7858
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17159
published_at 2026-04-01T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17324
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17372
published_at 2026-04-04T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17151
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17242
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.173
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17314
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17264
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17205
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-16T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.1715
published_at 2026-04-18T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17185
published_at 2026-04-21T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.1709
published_at 2026-04-24T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.17073
published_at 2026-04-26T12:55:00Z
14
value 0.00055
scoring_system epss
scoring_elements 0.17017
published_at 2026-04-29T12:55:00Z
15
value 0.00055
scoring_system epss
scoring_elements 0.16881
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7858
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553402
reference_id 1553402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553402
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892497
reference_id 892497
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892497
6
reference_url https://access.redhat.com/errata/RHSA-2018:1369
reference_id RHSA-2018:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1369
7
reference_url https://access.redhat.com/errata/RHSA-2018:1416
reference_id RHSA-2018:1416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1416
8
reference_url https://access.redhat.com/errata/RHSA-2018:1643
reference_id RHSA-2018:1643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1643
9
reference_url https://access.redhat.com/errata/RHSA-2018:1644
reference_id RHSA-2018:1644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1644
10
reference_url https://access.redhat.com/errata/RHSA-2018:1645
reference_id RHSA-2018:1645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1645
11
reference_url https://access.redhat.com/errata/RHSA-2018:1646
reference_id RHSA-2018:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1646
12
reference_url https://access.redhat.com/errata/RHSA-2018:2162
reference_id RHSA-2018:2162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2162
13
reference_url https://usn.ubuntu.com/3649-1/
reference_id USN-3649-1
reference_type
scores
url https://usn.ubuntu.com/3649-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-cenj-mz55-jbg6
5
vulnerability VCID-d2ve-dnmj-4bbz
6
vulnerability VCID-ej5p-r4az-6ud2
7
vulnerability VCID-ewb7-nrtu-g7ex
8
vulnerability VCID-gc6n-kgsc-f3b6
9
vulnerability VCID-m47q-17n6-t7gg
10
vulnerability VCID-mtj9-1cns-yybw
11
vulnerability VCID-n71j-fz74-kyhf
12
vulnerability VCID-p2dz-mtns-5bb4
13
vulnerability VCID-ptty-88p4-ybe9
14
vulnerability VCID-pxjg-chmx-nkdc
15
vulnerability VCID-qh2s-apkz-sbaz
16
vulnerability VCID-t58m-9jqp-43c9
17
vulnerability VCID-t5gq-4bhn-gkej
18
vulnerability VCID-uzxc-npak-yyc4
19
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-hkf8-96k7-kuc9
3
vulnerability VCID-m47q-17n6-t7gg
4
vulnerability VCID-n71j-fz74-kyhf
5
vulnerability VCID-t58m-9jqp-43c9
6
vulnerability VCID-uzxc-npak-yyc4
7
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-detn-3zsq-3qh7
5
vulnerability VCID-m47q-17n6-t7gg
6
vulnerability VCID-n71j-fz74-kyhf
7
vulnerability VCID-n9n4-prkb-f3c6
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
aliases CVE-2018-7858
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jq6v-ra9m-sqgz
3
url VCID-rkxf-jp2j-mqgf
vulnerability_id VCID-rkxf-jp2j-mqgf
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15124
reference_id
reference_type
scores
0
value 0.00759
scoring_system epss
scoring_elements 0.73403
published_at 2026-05-05T12:55:00Z
1
value 0.01684
scoring_system epss
scoring_elements 0.82133
published_at 2026-04-01T12:55:00Z
2
value 0.01684
scoring_system epss
scoring_elements 0.82242
published_at 2026-04-21T12:55:00Z
3
value 0.01684
scoring_system epss
scoring_elements 0.82264
published_at 2026-04-24T12:55:00Z
4
value 0.01684
scoring_system epss
scoring_elements 0.82276
published_at 2026-04-26T12:55:00Z
5
value 0.01684
scoring_system epss
scoring_elements 0.8228
published_at 2026-04-29T12:55:00Z
6
value 0.01684
scoring_system epss
scoring_elements 0.82146
published_at 2026-04-02T12:55:00Z
7
value 0.01684
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-04T12:55:00Z
8
value 0.01684
scoring_system epss
scoring_elements 0.82164
published_at 2026-04-07T12:55:00Z
9
value 0.01684
scoring_system epss
scoring_elements 0.8219
published_at 2026-04-08T12:55:00Z
10
value 0.01684
scoring_system epss
scoring_elements 0.82198
published_at 2026-04-09T12:55:00Z
11
value 0.01684
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-11T12:55:00Z
12
value 0.01684
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-12T12:55:00Z
13
value 0.01684
scoring_system epss
scoring_elements 0.82204
published_at 2026-04-13T12:55:00Z
14
value 0.01684
scoring_system epss
scoring_elements 0.8224
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:N/I:N/A:C
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://www.debian.org/security/2018/dsa-4213
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4213
15
reference_url http://www.securityfocus.com/bid/102295
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102295
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1525195
reference_id 1525195
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1525195
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806
reference_id 884806
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15124
reference_id CVE-2017-15124
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15124
20
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
21
reference_url https://access.redhat.com/errata/RHSA-2018:0816
reference_id RHSA-2018:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0816
22
reference_url https://access.redhat.com/errata/RHSA-2018:1104
reference_id RHSA-2018:1104
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1104
23
reference_url https://access.redhat.com/errata/RHSA-2018:1113
reference_id RHSA-2018:1113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1113
24
reference_url https://access.redhat.com/errata/RHSA-2018:3062
reference_id RHSA-2018:3062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3062
25
reference_url https://usn.ubuntu.com/3575-1/
reference_id USN-3575-1
reference_type
scores
url https://usn.ubuntu.com/3575-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-cenj-mz55-jbg6
5
vulnerability VCID-d2ve-dnmj-4bbz
6
vulnerability VCID-ej5p-r4az-6ud2
7
vulnerability VCID-ewb7-nrtu-g7ex
8
vulnerability VCID-gc6n-kgsc-f3b6
9
vulnerability VCID-m47q-17n6-t7gg
10
vulnerability VCID-mtj9-1cns-yybw
11
vulnerability VCID-n71j-fz74-kyhf
12
vulnerability VCID-p2dz-mtns-5bb4
13
vulnerability VCID-ptty-88p4-ybe9
14
vulnerability VCID-pxjg-chmx-nkdc
15
vulnerability VCID-qh2s-apkz-sbaz
16
vulnerability VCID-t58m-9jqp-43c9
17
vulnerability VCID-t5gq-4bhn-gkej
18
vulnerability VCID-uzxc-npak-yyc4
19
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-hkf8-96k7-kuc9
3
vulnerability VCID-m47q-17n6-t7gg
4
vulnerability VCID-n71j-fz74-kyhf
5
vulnerability VCID-t58m-9jqp-43c9
6
vulnerability VCID-uzxc-npak-yyc4
7
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-detn-3zsq-3qh7
5
vulnerability VCID-m47q-17n6-t7gg
6
vulnerability VCID-n71j-fz74-kyhf
7
vulnerability VCID-n9n4-prkb-f3c6
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
aliases CVE-2017-15124
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rkxf-jp2j-mqgf
4
url VCID-uryz-5yk9-9fd7
vulnerability_id VCID-uryz-5yk9-9fd7
summary
Multiple vulnerabilities have been found in QEMU, the worst of
    which may allow an attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7550
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24463
published_at 2026-04-08T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24581
published_at 2026-04-02T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24617
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24395
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24507
published_at 2026-04-09T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24523
published_at 2026-04-11T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24479
published_at 2026-04-12T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24421
published_at 2026-04-13T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24437
published_at 2026-04-16T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24429
published_at 2026-04-18T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24404
published_at 2026-04-21T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24289
published_at 2026-04-24T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24275
published_at 2026-04-26T12:55:00Z
13
value 0.00084
scoring_system epss
scoring_elements 0.24235
published_at 2026-04-29T12:55:00Z
14
value 0.00084
scoring_system epss
scoring_elements 0.24121
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7550
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1549798
reference_id 1549798
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1549798
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041
reference_id 892041
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041
16
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
17
reference_url https://access.redhat.com/errata/RHSA-2018:1369
reference_id RHSA-2018:1369
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1369
18
reference_url https://access.redhat.com/errata/RHSA-2018:1643
reference_id RHSA-2018:1643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1643
19
reference_url https://access.redhat.com/errata/RHSA-2018:1644
reference_id RHSA-2018:1644
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1644
20
reference_url https://access.redhat.com/errata/RHSA-2018:1645
reference_id RHSA-2018:1645
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1645
21
reference_url https://access.redhat.com/errata/RHSA-2018:1646
reference_id RHSA-2018:1646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1646
22
reference_url https://access.redhat.com/errata/RHSA-2018:2462
reference_id RHSA-2018:2462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2462
23
reference_url https://usn.ubuntu.com/3649-1/
reference_id USN-3649-1
reference_type
scores
url https://usn.ubuntu.com/3649-1/
fixed_packages
0
url pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-cenj-mz55-jbg6
5
vulnerability VCID-d2ve-dnmj-4bbz
6
vulnerability VCID-ej5p-r4az-6ud2
7
vulnerability VCID-ewb7-nrtu-g7ex
8
vulnerability VCID-gc6n-kgsc-f3b6
9
vulnerability VCID-m47q-17n6-t7gg
10
vulnerability VCID-mtj9-1cns-yybw
11
vulnerability VCID-n71j-fz74-kyhf
12
vulnerability VCID-p2dz-mtns-5bb4
13
vulnerability VCID-ptty-88p4-ybe9
14
vulnerability VCID-pxjg-chmx-nkdc
15
vulnerability VCID-qh2s-apkz-sbaz
16
vulnerability VCID-t58m-9jqp-43c9
17
vulnerability VCID-t5gq-4bhn-gkej
18
vulnerability VCID-uzxc-npak-yyc4
19
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-hkf8-96k7-kuc9
3
vulnerability VCID-m47q-17n6-t7gg
4
vulnerability VCID-n71j-fz74-kyhf
5
vulnerability VCID-t58m-9jqp-43c9
6
vulnerability VCID-uzxc-npak-yyc4
7
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-detn-3zsq-3qh7
5
vulnerability VCID-m47q-17n6-t7gg
6
vulnerability VCID-n71j-fz74-kyhf
7
vulnerability VCID-n9n4-prkb-f3c6
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
aliases CVE-2018-7550
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uryz-5yk9-9fd7
5
url VCID-v8fp-rzfq-e3bs
vulnerability_id VCID-v8fp-rzfq-e3bs
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
reference_id
reference_type
scores
0
value 0.88597
scoring_system epss
scoring_elements 0.995
published_at 2026-04-02T12:55:00Z
1
value 0.88597
scoring_system epss
scoring_elements 0.99501
published_at 2026-04-04T12:55:00Z
2
value 0.89042
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-26T12:55:00Z
3
value 0.89094
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-18T12:55:00Z
4
value 0.89094
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-16T12:55:00Z
5
value 0.89094
scoring_system epss
scoring_elements 0.9953
published_at 2026-04-13T12:55:00Z
6
value 0.89094
scoring_system epss
scoring_elements 0.99529
published_at 2026-04-09T12:55:00Z
7
value 0.89147
scoring_system epss
scoring_elements 0.99538
published_at 2026-04-24T12:55:00Z
8
value 0.89198
scoring_system epss
scoring_elements 0.99543
published_at 2026-05-05T12:55:00Z
9
value 0.89198
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-07T12:55:00Z
10
value 0.89198
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-08T12:55:00Z
11
value 0.89198
scoring_system epss
scoring_elements 0.99539
published_at 2026-04-21T12:55:00Z
12
value 0.89198
scoring_system epss
scoring_elements 0.99542
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
61
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:N/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
62
reference_url http://www.securityfocus.com/bid/102376
reference_id 102376
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securityfocus.com/bid/102376
63
reference_url http://www.securitytracker.com/id/1040071
reference_id 1040071
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securitytracker.com/id/1040071
64
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
reference_id 1519780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
65
reference_url https://www.kb.cert.org/vuls/id/180049
reference_id 180049
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.kb.cert.org/vuls/id/180049
66
reference_url https://seclists.org/bugtraq/2019/Jun/36
reference_id 36
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://seclists.org/bugtraq/2019/Jun/36
67
reference_url https://www.exploit-db.com/exploits/43427/
reference_id 43427
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.exploit-db.com/exploits/43427/
68
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
reference_id 4609
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
69
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
reference_id 4611
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
70
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
reference_id 4613
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
71
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
reference_id 4614
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
72
reference_url http://www.kb.cert.org/vuls/id/584653
reference_id 584653
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.kb.cert.org/vuls/id/584653
73
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
reference_id 886532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
74
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
75
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
reference_id ADV180002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
76
reference_url http://xenbits.xen.org/xsa/advisory-254.html
reference_id advisory-254.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://xenbits.xen.org/xsa/advisory-254.html
77
reference_url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_id advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
78
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
reference_id ARUBA-PSA-2018-001.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
79
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
reference_id ARUBA-PSA-2019-003.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
80
reference_url https://security.archlinux.org/ASA-201801-10
reference_id ASA-201801-10
reference_type
scores
url https://security.archlinux.org/ASA-201801-10
81
reference_url https://security.archlinux.org/AVG-557
reference_id AVG-557
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-557
82
reference_url https://security.archlinux.org/AVG-558
reference_id AVG-558
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-558
83
reference_url https://security.archlinux.org/AVG-559
reference_id AVG-559
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-559
84
reference_url https://security.archlinux.org/AVG-582
reference_id AVG-582
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-582
85
reference_url https://security.archlinux.org/AVG-583
reference_id AVG-583
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-583
86
reference_url https://security.archlinux.org/AVG-987
reference_id AVG-987
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-987
87
reference_url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
reference_id AWS-2018-013
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
88
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
reference_id cisco-sa-20180104-cpusidechannel
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
89
reference_url https://support.citrix.com/article/CTX231399
reference_id CTX231399
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.citrix.com/article/CTX231399
90
reference_url https://security.paloaltonetworks.com/CVE-2017-5715
reference_id CVE-2017-5715
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.paloaltonetworks.com/CVE-2017-5715
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
92
reference_url https://spectreattack.com/spectre.pdf
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://spectreattack.com/spectre.pdf
93
reference_url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
reference_id display?docId=emr_na-hpesbhf03805en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
94
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
95
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
reference_id FreeBSD-SA-18:03.speculative_execution.asc
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
96
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
97
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.gentoo.org/glsa/201810-06
98
reference_url https://support.f5.com/csp/article/K91229003
reference_id K91229003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.f5.com/csp/article/K91229003
99
reference_url https://support.lenovo.com/us/en/solutions/LEN-18282
reference_id LEN-18282
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.lenovo.com/us/en/solutions/LEN-18282
100
reference_url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
reference_id mitel-product-security-advisory-18-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
101
reference_url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
reference_id mitigations-landing-new-class-timing-attack
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
102
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
103
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
104
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
105
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
106
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
107
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
108
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
109
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
110
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
111
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
112
reference_url https://security.netapp.com/advisory/ntap-20180104-0001/
reference_id ntap-20180104-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.netapp.com/advisory/ntap-20180104-0001/
113
reference_url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
reference_id reading-privileged-memory-with-side.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
114
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
115
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
116
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
117
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
118
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
119
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
120
reference_url https://access.redhat.com/errata/RHSA-2018:0023
reference_id RHSA-2018:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0023
121
reference_url https://access.redhat.com/errata/RHSA-2018:0027
reference_id RHSA-2018:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0027
122
reference_url https://access.redhat.com/errata/RHSA-2018:0028
reference_id RHSA-2018:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0028
123
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/errata/RHSA-2018:0292
124
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
125
reference_url https://access.redhat.com/errata/RHSA-2018:1129
reference_id RHSA-2018:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1129
126
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
127
reference_url https://access.redhat.com/errata/RHSA-2018:1196
reference_id RHSA-2018:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1196
128
reference_url https://access.redhat.com/errata/RHSA-2018:1216
reference_id RHSA-2018:1216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1216
129
reference_url https://access.redhat.com/errata/RHSA-2018:1252
reference_id RHSA-2018:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1252
130
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
131
reference_url https://access.redhat.com/errata/RHSA-2018:1346
reference_id RHSA-2018:1346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1346
132
reference_url https://access.redhat.com/errata/RHSA-2018:1967
reference_id RHSA-2018:1967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1967
133
reference_url https://spectreattack.com/
reference_id spectreattack.com
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://spectreattack.com/
134
reference_url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_id Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
135
reference_url https://access.redhat.com/security/vulnerabilities/speculativeexecution
reference_id speculativeexecution
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/security/vulnerabilities/speculativeexecution
136
reference_url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
reference_id speculative-processor-vulnerability
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
137
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
reference_id ssa-608355.pdf
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
138
reference_url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
reference_id suse-addresses-meltdown-spectre-vulnerabilities
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
139
reference_url https://www.synology.com/support/security/Synology_SA_18_01
reference_id Synology_SA_18_01
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.synology.com/support/security/Synology_SA_18_01
140
reference_url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
reference_id todays-cpu-vulnerability-what-you-need.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
141
reference_url https://usn.ubuntu.com/usn/usn-3516-1/
reference_id usn-3516-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/usn/usn-3516-1/
142
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
143
reference_url https://usn.ubuntu.com/3530-1/
reference_id USN-3530-1
reference_type
scores
url https://usn.ubuntu.com/3530-1/
144
reference_url https://usn.ubuntu.com/3531-1/
reference_id USN-3531-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-1/
145
reference_url https://usn.ubuntu.com/3531-3/
reference_id USN-3531-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-3/
146
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
147
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3540-2/
148
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
149
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3541-2/
150
reference_url https://usn.ubuntu.com/3542-1/
reference_id USN-3542-1
reference_type
scores
url https://usn.ubuntu.com/3542-1/
151
reference_url https://usn.ubuntu.com/3542-2/
reference_id USN-3542-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3542-2/
152
reference_url https://usn.ubuntu.com/3549-1/
reference_id USN-3549-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3549-1/
153
reference_url https://usn.ubuntu.com/3560-1/
reference_id USN-3560-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3560-1/
154
reference_url https://usn.ubuntu.com/3561-1/
reference_id USN-3561-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3561-1/
155
reference_url https://usn.ubuntu.com/3580-1/
reference_id USN-3580-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3580-1/
156
reference_url https://usn.ubuntu.com/3581-1/
reference_id USN-3581-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-1/
157
reference_url https://usn.ubuntu.com/3581-2/
reference_id USN-3581-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-2/
158
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-1/
159
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-2/
160
reference_url https://usn.ubuntu.com/3594-1/
reference_id USN-3594-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3594-1/
161
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-1/
162
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-2/
163
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3620-2/
164
reference_url https://usn.ubuntu.com/3690-1/
reference_id USN-3690-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3690-1/
165
reference_url https://usn.ubuntu.com/3777-3/
reference_id USN-3777-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3777-3/
166
reference_url https://cert.vde.com/en-us/advisories/vde-2018-002
reference_id vde-2018-002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-002
167
reference_url https://cert.vde.com/en-us/advisories/vde-2018-003
reference_id vde-2018-003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-003
168
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
reference_id VMSA-2018-0002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
169
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
reference_id VMSA-2018-0004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
170
reference_url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
reference_id VMSA-2018-0007.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
171
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
0
url pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3kyg-9mf3-kfft
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-6qnt-yaa3-p3bb
4
vulnerability VCID-cenj-mz55-jbg6
5
vulnerability VCID-d2ve-dnmj-4bbz
6
vulnerability VCID-ej5p-r4az-6ud2
7
vulnerability VCID-ewb7-nrtu-g7ex
8
vulnerability VCID-gc6n-kgsc-f3b6
9
vulnerability VCID-m47q-17n6-t7gg
10
vulnerability VCID-mtj9-1cns-yybw
11
vulnerability VCID-n71j-fz74-kyhf
12
vulnerability VCID-p2dz-mtns-5bb4
13
vulnerability VCID-ptty-88p4-ybe9
14
vulnerability VCID-pxjg-chmx-nkdc
15
vulnerability VCID-qh2s-apkz-sbaz
16
vulnerability VCID-t58m-9jqp-43c9
17
vulnerability VCID-t5gq-4bhn-gkej
18
vulnerability VCID-uzxc-npak-yyc4
19
vulnerability VCID-w7gc-1eh2-3ufu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
purl pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-46gg-8h8g-2kf5
1
vulnerability VCID-4mt9-kf9m-2fbz
2
vulnerability VCID-hkf8-96k7-kuc9
3
vulnerability VCID-m47q-17n6-t7gg
4
vulnerability VCID-n71j-fz74-kyhf
5
vulnerability VCID-t58m-9jqp-43c9
6
vulnerability VCID-uzxc-npak-yyc4
7
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie
3
url pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-9szt-c829-zfdh
4
vulnerability VCID-detn-3zsq-3qh7
5
vulnerability VCID-m47q-17n6-t7gg
6
vulnerability VCID-n71j-fz74-kyhf
7
vulnerability VCID-n9n4-prkb-f3c6
8
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9szt-c829-zfdh
1
vulnerability VCID-detn-3zsq-3qh7
2
vulnerability VCID-m47q-17n6-t7gg
3
vulnerability VCID-vcun-y6d5-6uby
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1j9f-u62h-rug2
1
vulnerability VCID-46gg-8h8g-2kf5
2
vulnerability VCID-4mt9-kf9m-2fbz
3
vulnerability VCID-n9n4-prkb-f3c6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie
6
url pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
purl pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie
aliases CVE-2017-5715
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie