Lookup for vulnerable packages by Package URL.

GET /api/packages/78063?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "qemu",
    "version": "2.5.0-r2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.7.0-r3",
    "latest_non_vulnerable_version": "8.0.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49886?format=api",
            "vulnerability_id": "VCID-1wst-y74g-gqb5",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0081.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0081.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0082.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0082.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0083.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0083.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0084.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0084.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0085.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0085.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0086.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0086.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0087.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0087.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0088.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1714.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1714.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56883",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56943",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5683",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56925",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56946",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56922",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56973",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56976",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56983",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5694",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56969",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-01/msg00428.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/11/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/01/11/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/12/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/01/12/10"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/12/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/01/12/11"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/80250",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/80250"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034858"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296060",
                    "reference_id": "1296060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1296060"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1714",
                    "reference_id": "CVE-2016-1714",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1714"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0081",
                    "reference_id": "RHSA-2016:0081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0081"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0082",
                    "reference_id": "RHSA-2016:0082",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0082"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0083",
                    "reference_id": "RHSA-2016:0083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0083"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0084",
                    "reference_id": "RHSA-2016:0084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0085",
                    "reference_id": "RHSA-2016:0085",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0085"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0086",
                    "reference_id": "RHSA-2016:0086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0087",
                    "reference_id": "RHSA-2016:0087",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0087"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0088",
                    "reference_id": "RHSA-2016:0088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0088"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-1714"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wst-y74g-gqb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49891?format=api",
            "vulnerability_id": "VCID-4xv9-ahxv-tuh1",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=80eecda8e5d09c442c24307f340840a5b70ea3b9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=80eecda8e5d09c442c24307f340840a5b70ea3b9"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2392.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2392.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24736",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24887",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24966",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25006",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24781",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24849",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24908",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24869",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24814",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24826",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24818",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2392"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg02553.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg02553.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/16/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/16/7"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/83274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/83274"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2974-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2974-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302299",
                    "reference_id": "1302299",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302299"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815008",
                    "reference_id": "815008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815008"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2392",
                    "reference_id": "CVE-2016-2392",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2974-1/",
                    "reference_id": "USN-2974-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2974-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-2392"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4xv9-ahxv-tuh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49888?format=api",
            "vulnerability_id": "VCID-7rh3-6w55-sqat",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1981.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1981.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19258",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19448",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19581",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19628",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19349",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19427",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19479",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19483",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19435",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19338",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19345",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19359",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298570",
                    "reference_id": "1298570",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298570"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812307",
                    "reference_id": "812307",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812307"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2585",
                    "reference_id": "RHSA-2016:2585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2585"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-1981"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rh3-6w55-sqat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49889?format=api",
            "vulnerability_id": "VCID-aa98-tyaq-3kew",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2197.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2197.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29403",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29693",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29744",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29563",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29664",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29666",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29571",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2959",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29564",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29519",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2197"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302057",
                    "reference_id": "1302057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302057"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813194",
                    "reference_id": "813194",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813194"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-2197"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aa98-tyaq-3kew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49885?format=api",
            "vulnerability_id": "VCID-gn2n-q1pj-3qcg",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87298",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8728",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87224",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87237",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87257",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87264",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87277",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87271",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87267",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87282",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03318",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87286",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02930.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/23/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/23/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79668"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283926",
                    "reference_id": "1283926",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283926"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809237",
                    "reference_id": "809237",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809237"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8619",
                    "reference_id": "CVE-2015-8619",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8619"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2015-8619"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gn2n-q1pj-3qcg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49890?format=api",
            "vulnerability_id": "VCID-m549-2ra5-2fct",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2198.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2198.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28258",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28482",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28577",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2862",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28423",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2849",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28531",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28533",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28441",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28435",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28383",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301643",
                    "reference_id": "1301643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1301643"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813193",
                    "reference_id": "813193",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813193"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-2198"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m549-2ra5-2fct"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49892?format=api",
            "vulnerability_id": "VCID-nhc4-1zw4-mfgq",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e"
                },
                {
                    "reference_url": "http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.nongnu.org/archive/html/qemu-stable/2016-03/msg00064.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2538.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2538.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24997",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25057",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25159",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25239",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25052",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25121",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25178",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25136",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25083",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25094",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25085",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2016-02/msg03658.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/22/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/22/3"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/83336",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/83336"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2974-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2974-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303120",
                    "reference_id": "1303120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1303120"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815680",
                    "reference_id": "815680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815680"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2538",
                    "reference_id": "CVE-2016-2538",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2538"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2974-1/",
                    "reference_id": "USN-2974-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2974-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-2538"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nhc4-1zw4-mfgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49887?format=api",
            "vulnerability_id": "VCID-rfgr-472m-kues",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1922.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1922.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23958",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24126",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24256",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24289",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24075",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24142",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24187",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24205",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24163",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24106",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2412",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24107",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24084",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283934",
                    "reference_id": "1283934",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283934"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811201",
                    "reference_id": "811201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811201"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-1922"
            ],
            "risk_score": 0.7,
            "exploitability": "0.5",
            "weighted_severity": "1.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rfgr-472m-kues"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49893?format=api",
            "vulnerability_id": "VCID-vgab-s8sr-53d9",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=60253ed1e6ec6d8e5ef2efe7bf755f475dce9956"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2858.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2858.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31442",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31651",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31619",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31637",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31769",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31813",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31631",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31683",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31712",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31716",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31675",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31639",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31673",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2858"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/04/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/03/04/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/03/07/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/03/07/4"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/84134",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/84134"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2974-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2974-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314676",
                    "reference_id": "1314676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314676"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817183",
                    "reference_id": "817183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817183"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2858",
                    "reference_id": "CVE-2016-2858",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2858"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2974-1/",
                    "reference_id": "USN-2974-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2974-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2016-2858"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vgab-s8sr-53d9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49884?format=api",
            "vulnerability_id": "VCID-yxet-nzmk-rkdf",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could lead to arbitrary code execution, or cause a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8613.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8613.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2766",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27715",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27875",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27929",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27971",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27762",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27829",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27871",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27877",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27834",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27777",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27783",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27758",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg03737.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/22/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/22/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79719"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284008",
                    "reference_id": "1284008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284008"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809232",
                    "reference_id": "809232",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809232"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8613",
                    "reference_id": "CVE-2015-8613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8613"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-01",
                    "reference_id": "GLSA-201604-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78063?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
                }
            ],
            "aliases": [
                "CVE-2015-8613"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxet-nzmk-rkdf"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r2"
}