Lookup for vulnerable packages by Package URL.

GET /api/packages/74704?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "virtualbox",
    "version": "6.1.18",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "6.1.36",
    "latest_non_vulnerable_version": "7.0.12",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37838?format=api",
            "vulnerability_id": "VCID-1f3h-ez88-fudr",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37624",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37659",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37673",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37687",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37652",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37522",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37704",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37729",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37608",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2074"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2074"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1f3h-ez88-fudr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37886?format=api",
            "vulnerability_id": "VCID-2a63-hzam-z7h7",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2125",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30983",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31037",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31072",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31028",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3099",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31114",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31161",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3098",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2125"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2125"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a63-hzam-z7h7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37898?format=api",
            "vulnerability_id": "VCID-2hdx-s4fs-wua5",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37889",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37904",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37868",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3774",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37923",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37948",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37826",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2128"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2128"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hdx-s4fs-wua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37812?format=api",
            "vulnerability_id": "VCID-3fme-q3w9-j7hc",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14885",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34266",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34225",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34201",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34329",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14885"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:00Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1281/",
                    "reference_id": "ZDI-20-1281",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:00Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1281/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14885"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3fme-q3w9-j7hc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37853?format=api",
            "vulnerability_id": "VCID-4txk-ybs5-ukea",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37055",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37094",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37106",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37117",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37212",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37043",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2112"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2112"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4txk-ybs5-ukea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37913?format=api",
            "vulnerability_id": "VCID-6e2r-qhmm-t7ca",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53691",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53763",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53761",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53809",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53792",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53777",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53711",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00305",
                            "scoring_system": "epss",
                            "scoring_elements": "0.53738",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2131"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:10Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2131"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6e2r-qhmm-t7ca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37863?format=api",
            "vulnerability_id": "VCID-7agu-g9dg-b3d6",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36646",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36612",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36527",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36699",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3673",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36568",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2120"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2120"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7agu-g9dg-b3d6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37860?format=api",
            "vulnerability_id": "VCID-bgsu-2ev5-yubb",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88035",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88058",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88064",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88083",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88089",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88099",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88092",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88093",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03803",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88045",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2119"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202104-08",
                    "reference_id": "GLSA-202104-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202104-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2119"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgsu-2ev5-yubb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37849?format=api",
            "vulnerability_id": "VCID-cm69-aycs-kfh2",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37055",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37094",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37106",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37117",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37183",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37212",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00162",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37043",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2111"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2111"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cm69-aycs-kfh2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37890?format=api",
            "vulnerability_id": "VCID-ejgu-35ae-7ydr",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36064",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36104",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36122",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36129",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3609",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35995",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36219",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36054",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2126"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:15Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2126"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejgu-35ae-7ydr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37819?format=api",
            "vulnerability_id": "VCID-f16m-ykmk-a7by",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14886",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34266",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34225",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34201",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34329",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14886"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:59Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1280/",
                    "reference_id": "ZDI-20-1280",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:59Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1280/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14886"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f16m-ykmk-a7by"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37798?format=api",
            "vulnerability_id": "VCID-farh-f8xm-sqg6",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14365",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14493",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1451",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14423",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1443",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14564",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14372",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00047",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14456",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14872"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:53:54Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14872"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-farh-f8xm-sqg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37804?format=api",
            "vulnerability_id": "VCID-mpxx-4u9h-5qg3",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33961",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34265",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34266",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34225",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34201",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34329",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14881"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:02Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1278/",
                    "reference_id": "ZDI-20-1278",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:02Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1278/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14881"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mpxx-4u9h-5qg3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37808?format=api",
            "vulnerability_id": "VCID-nnum-bqqa-fyfx",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14884",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39952",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40099",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40046",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40098",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40112",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40122",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40084",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40065",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40125",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14884"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:01Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1279/",
                    "reference_id": "ZDI-20-1279",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:01Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1279/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14884"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnum-bqqa-fyfx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37868?format=api",
            "vulnerability_id": "VCID-p2kk-dt57-r7ap",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2121",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3779",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37803",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37817",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37782",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37654",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37835",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37861",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00166",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37739",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2121"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:24Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2121"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2kk-dt57-r7ap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37842?format=api",
            "vulnerability_id": "VCID-q5ca-n4hk-r3fj",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40518",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40548",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40609",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40627",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40589",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4057",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40599",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40626",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2086"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:18Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2086"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5ca-n4hk-r3fj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37875?format=api",
            "vulnerability_id": "VCID-qzab-crkk-zfba",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2123",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14819",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14951",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14916",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14878",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14882",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1493",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15007",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14812",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2123"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:20Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2123"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qzab-crkk-zfba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37894?format=api",
            "vulnerability_id": "VCID-sjun-jhtp-hfce",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41542",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41564",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41531",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4144",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4153",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41558",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41484",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2127"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:14Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2127"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sjun-jhtp-hfce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37834?format=api",
            "vulnerability_id": "VCID-tehr-wkyz-8kcd",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41542",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41564",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41531",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4144",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4153",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41558",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41484",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2073"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:35Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2073"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tehr-wkyz-8kcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37830?format=api",
            "vulnerability_id": "VCID-tztw-eec3-6kaz",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1788",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1804",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18095",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17797",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17884",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17944",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17961",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17916",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17867",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14892"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14892"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tztw-eec3-6kaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37823?format=api",
            "vulnerability_id": "VCID-uga2-91s8-ufck",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16884",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17031",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17013",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16988",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16943",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16864",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17085",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16867",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16956",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14889"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:55Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2020-14889"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uga2-91s8-ufck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37905?format=api",
            "vulnerability_id": "VCID-w2dh-qrtu-7ue3",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2129",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33177",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33204",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33241",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33169",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33328",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00135",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33161",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2129"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T18:11:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2129"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w2dh-qrtu-7ue3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37909?format=api",
            "vulnerability_id": "VCID-xy4k-b4dy-n7gb",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38797",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38809",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38773",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38657",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38787",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00174",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38737",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2130"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:11Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2130"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xy4k-b4dy-n7gb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37879?format=api",
            "vulnerability_id": "VCID-zh97-w3pz-53cc",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could result in privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40518",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40548",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40609",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40627",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40589",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4057",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40599",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40626",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2124"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-37",
                    "reference_id": "ASA-202101-37",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-37"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1483",
                    "reference_id": "AVG-1483",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1483"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-15",
                    "reference_id": "GLSA-202101-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:19Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202101-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74704?format=api",
                    "purl": "pkg:ebuild/app-emulation/virtualbox@6.1.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
                }
            ],
            "aliases": [
                "CVE-2021-2124"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zh97-w3pz-53cc"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/virtualbox@6.1.18"
}