Lookup for vulnerable packages by Package URL.

GET /api/packages/79061?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "xen",
    "version": "4.10.1-r2",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "4.12.0-r1",
    "latest_non_vulnerable_version": "4.17.4",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4148?format=api",
            "vulnerability_id": "VCID-5gua-j7zw-a7ex",
            "summary": "qemu may drive Xen into unbounded loop",
            "references": [
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2018/05/08/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2018/05/08/3"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21661",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21516",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21694",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21664",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21832",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21885",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21636",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21713",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21771",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21783",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21744",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21687",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4201"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104149",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104149"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571881",
                    "reference_id": "1571881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571881"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10981",
                    "reference_id": "CVE-2018-10981",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10981"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-262.html",
                    "reference_id": "XSA-262",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-262.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-10981",
                "XSA-262"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5gua-j7zw-a7ex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=api",
            "vulnerability_id": "VCID-6jsn-7538-a7ha",
            "summary": "L1 Terminal Fault speculative side channel",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88182",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88242",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88241",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88254",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88212",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88411",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88427",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005",
                    "reference_id": "1585005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-756",
                    "reference_id": "AVG-756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-756"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-757",
                    "reference_id": "AVG-757",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-757"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-758",
                    "reference_id": "AVG-758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-758"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384",
                    "reference_id": "RHSA-2018:2384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387",
                    "reference_id": "RHSA-2018:2387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388",
                    "reference_id": "RHSA-2018:2388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2388"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389",
                    "reference_id": "RHSA-2018:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390",
                    "reference_id": "RHSA-2018:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391",
                    "reference_id": "RHSA-2018:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392",
                    "reference_id": "RHSA-2018:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393",
                    "reference_id": "RHSA-2018:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394",
                    "reference_id": "RHSA-2018:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395",
                    "reference_id": "RHSA-2018:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396",
                    "reference_id": "RHSA-2018:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402",
                    "reference_id": "RHSA-2018:2402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403",
                    "reference_id": "RHSA-2018:2403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404",
                    "reference_id": "RHSA-2018:2404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602",
                    "reference_id": "RHSA-2018:2602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2602"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603",
                    "reference_id": "RHSA-2018:2603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2603"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-1/",
                    "reference_id": "USN-3740-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-2/",
                    "reference_id": "USN-3740-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-1/",
                    "reference_id": "USN-3741-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-2/",
                    "reference_id": "USN-3741-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-1/",
                    "reference_id": "USN-3742-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-2/",
                    "reference_id": "USN-3742-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3756-1/",
                    "reference_id": "USN-3756-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3756-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3823-1/",
                    "reference_id": "USN-3823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3823-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html",
                    "reference_id": "XSA-273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-273.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-3646",
                "XSA-273"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4159?format=api",
            "vulnerability_id": "VCID-7vn6-5h93-27hn",
            "summary": "L1 Terminal Fault speculative side channel",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84661",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84817",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86607",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86677",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86689",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86637",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86656",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86665",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86679",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005",
                    "reference_id": "1585005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-756",
                    "reference_id": "AVG-756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-756"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-757",
                    "reference_id": "AVG-757",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-757"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-758",
                    "reference_id": "AVG-758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-758"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384",
                    "reference_id": "RHSA-2018:2384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387",
                    "reference_id": "RHSA-2018:2387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388",
                    "reference_id": "RHSA-2018:2388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2388"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389",
                    "reference_id": "RHSA-2018:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390",
                    "reference_id": "RHSA-2018:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391",
                    "reference_id": "RHSA-2018:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392",
                    "reference_id": "RHSA-2018:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393",
                    "reference_id": "RHSA-2018:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394",
                    "reference_id": "RHSA-2018:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395",
                    "reference_id": "RHSA-2018:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396",
                    "reference_id": "RHSA-2018:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402",
                    "reference_id": "RHSA-2018:2402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403",
                    "reference_id": "RHSA-2018:2403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404",
                    "reference_id": "RHSA-2018:2404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602",
                    "reference_id": "RHSA-2018:2602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2602"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603",
                    "reference_id": "RHSA-2018:2603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2603"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-1/",
                    "reference_id": "USN-3740-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-2/",
                    "reference_id": "USN-3740-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-1/",
                    "reference_id": "USN-3741-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-2/",
                    "reference_id": "USN-3741-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-1/",
                    "reference_id": "USN-3742-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-2/",
                    "reference_id": "USN-3742-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3823-1/",
                    "reference_id": "USN-3823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3823-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html",
                    "reference_id": "XSA-273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-273.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-3620"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4142?format=api",
            "vulnerability_id": "VCID-8g31-68m7-b3ak",
            "summary": "grant table v2 -> v1 transition may crash Xen",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25963",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26046",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26087",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25853",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25923",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25974",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25984",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2594",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25883",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25865",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25835",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25771",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544459",
                    "reference_id": "1544459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544459"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-255.html",
                    "reference_id": "XSA-255",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-255.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-7541",
                "XSA-255"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8g31-68m7-b3ak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4139?format=api",
            "vulnerability_id": "VCID-9yjh-xh86-d7h8",
            "summary": "Information leak via side effects of speculative execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.94332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99953",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.94332",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99954",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778",
                    "reference_id": "1519778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852",
                    "reference_id": "886852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-557",
                    "reference_id": "AVG-557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-557"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-558",
                    "reference_id": "AVG-558",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-558"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-559",
                    "reference_id": "AVG-559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-559"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-987",
                    "reference_id": "AVG-987",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-987"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0010",
                    "reference_id": "RHSA-2018:0010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016",
                    "reference_id": "RHSA-2018:0016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017",
                    "reference_id": "RHSA-2018:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018",
                    "reference_id": "RHSA-2018:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0018"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020",
                    "reference_id": "RHSA-2018:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021",
                    "reference_id": "RHSA-2018:0021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022",
                    "reference_id": "RHSA-2018:0022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0151",
                    "reference_id": "RHSA-2018:0151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0151"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0182",
                    "reference_id": "RHSA-2018:0182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0182"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292",
                    "reference_id": "RHSA-2018:0292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0464",
                    "reference_id": "RHSA-2018:0464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0496",
                    "reference_id": "RHSA-2018:0496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0512",
                    "reference_id": "RHSA-2018:0512",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0512"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0654",
                    "reference_id": "RHSA-2018:0654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0654"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3516-1/",
                    "reference_id": "USN-3516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3521-1/",
                    "reference_id": "USN-3521-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3521-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3530-1/",
                    "reference_id": "USN-3530-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3530-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-1/",
                    "reference_id": "USN-3540-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-2/",
                    "reference_id": "USN-3540-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-1/",
                    "reference_id": "USN-3541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-2/",
                    "reference_id": "USN-3541-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-1/",
                    "reference_id": "USN-3542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3542-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-2/",
                    "reference_id": "USN-3542-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3542-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3549-1/",
                    "reference_id": "USN-3549-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3549-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3580-1/",
                    "reference_id": "USN-3580-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3580-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-1/",
                    "reference_id": "USN-3597-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3597-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-2/",
                    "reference_id": "USN-3597-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3597-2/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "XSA-254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-254.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2017-5753"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yjh-xh86-d7h8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4154?format=api",
            "vulnerability_id": "VCID-cuab-yybg-6uhs",
            "summary": "Use of v2 grant tables may cause crash on ARM",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39974",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40002",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39923",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39976",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39944",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39994",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39888",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39714",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610543",
                    "reference_id": "1610543",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610543"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-268.html",
                    "reference_id": "XSA-268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-268.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-15469",
                "XSA-268"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cuab-yybg-6uhs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4147?format=api",
            "vulnerability_id": "VCID-cvdk-37ua-3uck",
            "summary": "x86 vHPET interrupt injection errors",
            "references": [
                {
                    "reference_url": "http://openwall.com/lists/oss-security/2018/05/08/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://openwall.com/lists/oss-security/2018/05/08/2"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20989",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2114",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21118",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21277",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21329",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21081",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21162",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21222",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21233",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21191",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21138",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21131",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4201"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104150"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571880",
                    "reference_id": "1571880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571880"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10982",
                    "reference_id": "CVE-2018-10982",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10982"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-261.html",
                    "reference_id": "XSA-261",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-261.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-10982",
                "XSA-261"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cvdk-37ua-3uck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4152?format=api",
            "vulnerability_id": "VCID-eutx-gmuf-gkeq",
            "summary": "libxl fails to honour readonly flag on HVM emulated SCSI disks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85975",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86072",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86055",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86061",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86052",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85986",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86002",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86021",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86031",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86045",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86043",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86038",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12892"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4236"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/27/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2018/06/27/12"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104571",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104571"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041203"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-266.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://xenbits.xen.org/xsa/advisory-266.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590984",
                    "reference_id": "1590984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590984"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12892",
                    "reference_id": "CVE-2018-12892",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12892"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-266.html",
                    "reference_id": "XSA-266",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-266.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-12892",
                "XSA-266"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "8.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eutx-gmuf-gkeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4145?format=api",
            "vulnerability_id": "VCID-fafv-creg-qfbt",
            "summary": "x86: PV guest may crash Xen with XPTI",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18405",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18234",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18305",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18331",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1855",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18605",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18313",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18396",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18448",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.184",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18293",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4201"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104003"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566220",
                    "reference_id": "1566220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566220"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10471",
                    "reference_id": "CVE-2018-10471",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10471"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-259.html",
                    "reference_id": "XSA-259",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-259.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-10471",
                "XSA-259"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fafv-creg-qfbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4151?format=api",
            "vulnerability_id": "VCID-mehs-bmad-pkds",
            "summary": "x86: #DB exception safety check can be triggered by a guest",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21576",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21434",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21604",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21612",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21582",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21749",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21804",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21632",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2169",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21701",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21606",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12893"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
                },
                {
                    "reference_url": "https://support.citrix.com/article/CTX235748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.citrix.com/article/CTX235748"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4236"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/27/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2018/06/27/11"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104572",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104572"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041202"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-265.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://xenbits.xen.org/xsa/advisory-265.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979",
                    "reference_id": "1590979",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12893",
                    "reference_id": "CVE-2018-12893",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12893"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-265.html",
                    "reference_id": "XSA-265",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-265.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-12893",
                "XSA-265"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mehs-bmad-pkds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4150?format=api",
            "vulnerability_id": "VCID-nmg3-4zaj-zbaq",
            "summary": "preemption checks bypassed in x86 PV MM handling",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2208",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21931",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22122",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22117",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22071",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22237",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22284",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22068",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22148",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22203",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22224",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22183",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22123",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12891"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"
                },
                {
                    "reference_url": "https://support.citrix.com/article/CTX235748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.citrix.com/article/CTX235748"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4236"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/27/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2018/06/27/10"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104570",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104570"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1041201"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://xenbits.xen.org/xsa/advisory-264.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590985",
                    "reference_id": "1590985",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590985"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12891",
                    "reference_id": "CVE-2018-12891",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12891"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-264.html",
                    "reference_id": "XSA-264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-264.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-12891",
                "XSA-264"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmg3-4zaj-zbaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4141?format=api",
            "vulnerability_id": "VCID-rgt3-wkaw-eqca",
            "summary": "Information leak via side effects of speculative execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.87621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.87621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9947",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.87621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99469",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.87621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99466",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.87621",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99465",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.87752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99464",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.87752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99463",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.87752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99462",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.87752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99466",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.87752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99467",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.88229",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99495",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.88802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99522",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5754"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781",
                    "reference_id": "1519781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852",
                    "reference_id": "886852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-1",
                    "reference_id": "ASA-201801-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-1"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-3",
                    "reference_id": "ASA-201801-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-4",
                    "reference_id": "ASA-201801-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-6",
                    "reference_id": "ASA-201801-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-552",
                    "reference_id": "AVG-552",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-552"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-571",
                    "reference_id": "AVG-571",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-571"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-574",
                    "reference_id": "AVG-574",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-574"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-577",
                    "reference_id": "AVG-577",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-577"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0010",
                    "reference_id": "RHSA-2018:0010",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0010"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016",
                    "reference_id": "RHSA-2018:0016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017",
                    "reference_id": "RHSA-2018:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018",
                    "reference_id": "RHSA-2018:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0018"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020",
                    "reference_id": "RHSA-2018:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021",
                    "reference_id": "RHSA-2018:0021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022",
                    "reference_id": "RHSA-2018:0022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292",
                    "reference_id": "RHSA-2018:0292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0464",
                    "reference_id": "RHSA-2018:0464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0464"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062",
                    "reference_id": "RHSA-2018:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129",
                    "reference_id": "RHSA-2018:1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319",
                    "reference_id": "RHSA-2018:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346",
                    "reference_id": "RHSA-2018:1346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1374",
                    "reference_id": "RHSA-2018:1374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1374"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3516-1/",
                    "reference_id": "USN-3516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3522-1/",
                    "reference_id": "USN-3522-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3522-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3522-2/",
                    "reference_id": "USN-3522-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3522-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3523-1/",
                    "reference_id": "USN-3523-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3523-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3523-2/",
                    "reference_id": "USN-3523-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3523-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3524-1/",
                    "reference_id": "USN-3524-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3524-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3524-2/",
                    "reference_id": "USN-3524-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3524-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3525-1/",
                    "reference_id": "USN-3525-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3525-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-1/",
                    "reference_id": "USN-3540-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-2/",
                    "reference_id": "USN-3540-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-1/",
                    "reference_id": "USN-3541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-2/",
                    "reference_id": "USN-3541-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3583-1/",
                    "reference_id": "USN-3583-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3583-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-1/",
                    "reference_id": "USN-3597-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3597-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-2/",
                    "reference_id": "USN-3597-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3597-2/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "XSA-254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-254.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2017-5754"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgt3-wkaw-eqca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4155?format=api",
            "vulnerability_id": "VCID-rn1h-xy8j-uqgs",
            "summary": "x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30206",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30285",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30102",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30162",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30198",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30201",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30157",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30108",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30123",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30106",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3006",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00115",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2999",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610548",
                    "reference_id": "1610548",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610548"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-269.html",
                    "reference_id": "XSA-269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-269.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-15468",
                "XSA-269"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rn1h-xy8j-uqgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4143?format=api",
            "vulnerability_id": "VCID-sqyq-m67p-z7cc",
            "summary": "x86 PVH guest without LAPIC may DoS the host",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16925",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1709",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17144",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1692",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17009",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17068",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16996",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16936",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16873",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16876",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16914",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16818",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7542"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544453",
                    "reference_id": "1544453",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544453"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-256.html",
                    "reference_id": "XSA-256",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-256.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-7542",
                "XSA-256"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqyq-m67p-z7cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4144?format=api",
            "vulnerability_id": "VCID-t5uz-r29w-nueq",
            "summary": "Information leak via crafted user-supplied CDROM",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25133",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2497",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2506",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25032",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25213",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25025",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25094",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25138",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25153",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25111",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25058",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25069",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4201"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/104002"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566253",
                    "reference_id": "1566253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566253"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10472",
                    "reference_id": "CVE-2018-10472",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10472"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-258.html",
                    "reference_id": "XSA-258",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-258.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-10472",
                "XSA-258"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5uz-r29w-nueq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=api",
            "vulnerability_id": "VCID-v8fp-rzfq-e3bs",
            "summary": "Information leak via side effects of speculative execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.995",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99501",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.89147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99538",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99539",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102376",
                    "reference_id": "102376",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102376"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040071",
                    "reference_id": "1040071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780",
                    "reference_id": "1519780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/180049",
                    "reference_id": "180049",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/180049"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/36",
                    "reference_id": "36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jun/36"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/43427/",
                    "reference_id": "43427",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/43427/"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
                    "reference_id": "4609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
                    "reference_id": "4611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
                    "reference_id": "4613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
                    "reference_id": "4614",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/584653",
                    "reference_id": "584653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.kb.cert.org/vuls/id/584653"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532",
                    "reference_id": "886532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852",
                    "reference_id": "886852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
                    "reference_id": "ADV180002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "advisory-254.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-254.html"
                },
                {
                    "reference_url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_id": "advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
                    "reference_id": "ARUBA-PSA-2018-001.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
                    "reference_id": "ARUBA-PSA-2019-003.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-10",
                    "reference_id": "ASA-201801-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-557",
                    "reference_id": "AVG-557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-557"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-558",
                    "reference_id": "AVG-558",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-558"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-559",
                    "reference_id": "AVG-559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-559"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-582",
                    "reference_id": "AVG-582",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-582"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-583",
                    "reference_id": "AVG-583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-583"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-987",
                    "reference_id": "AVG-987",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-987"
                },
                {
                    "reference_url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
                    "reference_id": "AWS-2018-013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
                    "reference_id": "cisco-sa-20180104-cpusidechannel",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
                },
                {
                    "reference_url": "https://support.citrix.com/article/CTX231399",
                    "reference_id": "CTX231399",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.citrix.com/article/CTX231399"
                },
                {
                    "reference_url": "https://security.paloaltonetworks.com/CVE-2017-5715",
                    "reference_id": "CVE-2017-5715",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.paloaltonetworks.com/CVE-2017-5715"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"
                },
                {
                    "reference_url": "https://spectreattack.com/spectre.pdf",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://spectreattack.com/spectre.pdf"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
                    "reference_id": "display?docId=emr_na-hpesbhf03805en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
                },
                {
                    "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_id": "FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K91229003",
                    "reference_id": "K91229003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K91229003"
                },
                {
                    "reference_url": "https://support.lenovo.com/us/en/solutions/LEN-18282",
                    "reference_id": "LEN-18282",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
                },
                {
                    "reference_url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
                    "reference_id": "mitel-product-security-advisory-18-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
                },
                {
                    "reference_url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
                    "reference_id": "mitigations-landing-new-class-timing-attack",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
                    "reference_id": "msg00009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
                    "reference_id": "msg00012.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
                    "reference_id": "msg00013.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180104-0001/",
                    "reference_id": "ntap-20180104-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
                },
                {
                    "reference_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
                    "reference_id": "reading-privileged-memory-with-side.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016",
                    "reference_id": "RHSA-2018:0016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017",
                    "reference_id": "RHSA-2018:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018",
                    "reference_id": "RHSA-2018:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0018"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020",
                    "reference_id": "RHSA-2018:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021",
                    "reference_id": "RHSA-2018:0021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022",
                    "reference_id": "RHSA-2018:0022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0023",
                    "reference_id": "RHSA-2018:0023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0023"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0027",
                    "reference_id": "RHSA-2018:0027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0027"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0028",
                    "reference_id": "RHSA-2018:0028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292",
                    "reference_id": "RHSA-2018:0292",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062",
                    "reference_id": "RHSA-2018:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129",
                    "reference_id": "RHSA-2018:1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1130",
                    "reference_id": "RHSA-2018:1130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1196",
                    "reference_id": "RHSA-2018:1196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1196"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1216",
                    "reference_id": "RHSA-2018:1216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1252",
                    "reference_id": "RHSA-2018:1252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1252"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319",
                    "reference_id": "RHSA-2018:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346",
                    "reference_id": "RHSA-2018:1346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967",
                    "reference_id": "RHSA-2018:1967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1967"
                },
                {
                    "reference_url": "https://spectreattack.com/",
                    "reference_id": "spectreattack.com",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://spectreattack.com/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_id": "Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
                },
                {
                    "reference_url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
                    "reference_id": "speculativeexecution",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
                },
                {
                    "reference_url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
                    "reference_id": "speculative-processor-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
                    "reference_id": "ssa-608355.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
                },
                {
                    "reference_url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
                    "reference_id": "suse-addresses-meltdown-spectre-vulnerabilities",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_18_01",
                    "reference_id": "Synology_SA_18_01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_18_01"
                },
                {
                    "reference_url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
                    "reference_id": "todays-cpu-vulnerability-what-you-need.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/usn/usn-3516-1/",
                    "reference_id": "usn-3516-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/usn/usn-3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3516-1/",
                    "reference_id": "USN-3516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3530-1/",
                    "reference_id": "USN-3530-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3530-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-1/",
                    "reference_id": "USN-3531-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-3/",
                    "reference_id": "USN-3531-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-1/",
                    "reference_id": "USN-3540-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-2/",
                    "reference_id": "USN-3540-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3540-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-1/",
                    "reference_id": "USN-3541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-2/",
                    "reference_id": "USN-3541-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3541-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-1/",
                    "reference_id": "USN-3542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3542-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-2/",
                    "reference_id": "USN-3542-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3542-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3549-1/",
                    "reference_id": "USN-3549-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3549-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3560-1/",
                    "reference_id": "USN-3560-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3560-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3561-1/",
                    "reference_id": "USN-3561-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3561-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3580-1/",
                    "reference_id": "USN-3580-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3580-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-1/",
                    "reference_id": "USN-3581-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-2/",
                    "reference_id": "USN-3581-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-1/",
                    "reference_id": "USN-3582-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-2/",
                    "reference_id": "USN-3582-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3594-1/",
                    "reference_id": "USN-3594-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3594-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-1/",
                    "reference_id": "USN-3597-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-2/",
                    "reference_id": "USN-3597-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3620-2/",
                    "reference_id": "USN-3620-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3620-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3690-1/",
                    "reference_id": "USN-3690-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3690-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3777-3/",
                    "reference_id": "USN-3777-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3777-3/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-002",
                    "reference_id": "vde-2018-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-003",
                    "reference_id": "vde-2018-003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
                    "reference_id": "VMSA-2018-0002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
                    "reference_id": "VMSA-2018-0004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
                },
                {
                    "reference_url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
                    "reference_id": "VMSA-2018-0007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "XSA-254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-254.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2017-5715"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4137?format=api",
            "vulnerability_id": "VCID-x6ks-k1hc-27du",
            "summary": "DoS via non-preemptable L3/L4 pagetable freeing",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25601",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25672",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25555",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25613",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25572",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29315",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29484",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29503",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29476",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2943",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544456",
                    "reference_id": "1544456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544456"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-252.html",
                    "reference_id": "XSA-252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-252.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-7540",
                "XSA-252"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6ks-k1hc-27du"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4138?format=api",
            "vulnerability_id": "VCID-yaee-q1df-aqgm",
            "summary": "x86: memory leak with MSR emulation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18557",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18378",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18446",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18455",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18476",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18752",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18469",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18549",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18602",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18604",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18505",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5244"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/102433"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1040774"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528602",
                    "reference_id": "1528602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528602"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5244",
                    "reference_id": "CVE-2018-5244",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5244"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-253.html",
                    "reference_id": "XSA-253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-253.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-5244",
                "XSA-253"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yaee-q1df-aqgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4158?format=api",
            "vulnerability_id": "VCID-yh4r-yysd-1ua5",
            "summary": "oxenstored does not apply quota-maxentity",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39828",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39974",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40002",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39923",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39976",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3999",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39944",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39994",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39888",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00182",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39714",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610552",
                    "reference_id": "1610552",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610552"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-272.html",
                    "reference_id": "XSA-272",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-272.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api",
                    "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
                }
            ],
            "aliases": [
                "CVE-2018-15470",
                "XSA-272"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yh4r-yysd-1ua5"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2"
}