Lookup for vulnerable packages by Package URL.

GET /api/packages/83166?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "qemu",
    "version": "2.11.1-r1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.1.0-r4",
    "latest_non_vulnerable_version": "8.0.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56776?format=api",
            "vulnerability_id": "VCID-1erd-fd8p-hqch",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00668",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71226",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73714",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73671",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73704",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73586",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73609",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73582",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73618",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73631",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73653",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73635",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7367",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00777",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73679",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-13672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12809"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9375"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486560",
                    "reference_id": "1486560",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486560"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873851",
                    "reference_id": "873851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873851"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816",
                    "reference_id": "RHSA-2018:0816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104",
                    "reference_id": "RHSA-2018:1104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113",
                    "reference_id": "RHSA-2018:1113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162",
                    "reference_id": "RHSA-2018:2162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2162"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-13672"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1erd-fd8p-hqch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56778?format=api",
            "vulnerability_id": "VCID-d8cd-qgg7-fyed",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83891",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84025",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83984",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83985",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84012",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84019",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83948",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83954",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8397",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4213"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101923"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514148",
                    "reference_id": "1514148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514148"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136",
                    "reference_id": "882136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16845",
                    "reference_id": "CVE-2017-16845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16845"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3649-1/",
                    "reference_id": "USN-3649-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3649-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-16845"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8cd-qgg7-fyed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56780?format=api",
            "vulnerability_id": "VCID-e3xt-vft1-kbbe",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18030.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18030.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28947",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29023",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28881",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28995",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28951",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28901",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28925",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28855",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28737",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28625",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28555",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18030"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530360",
                    "reference_id": "1530360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530360"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-18030"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3xt-vft1-kbbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56779?format=api",
            "vulnerability_id": "VCID-gmvy-m5mq-yycx",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17381.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17381.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40072",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39859",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40235",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40127",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39954",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39939",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4022",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40167",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40231",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40243",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40205",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40187",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-12/msg00166.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4213"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2017/12/05/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2017/12/05/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/102059"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520782",
                    "reference_id": "1520782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520782"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625",
                    "reference_id": "883625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883625"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.11.0:rc3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17381",
                    "reference_id": "CVE-2017-17381",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17381"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-17381"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmvy-m5mq-yycx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56782?format=api",
            "vulnerability_id": "VCID-jnxy-g6wu-8ubu",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07759",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07758",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07744",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08059",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08025",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0801",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08123",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08086",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356",
                    "reference_id": "1530356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392",
                    "reference_id": "887392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816",
                    "reference_id": "RHSA-2018:0816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104",
                    "reference_id": "RHSA-2018:1104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113",
                    "reference_id": "RHSA-2018:1113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162",
                    "reference_id": "RHSA-2018:2162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2162"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2018-5683"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnxy-g6wu-8ubu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34654?format=api",
            "vulnerability_id": "VCID-re7g-2nvj-j3dp",
            "summary": "Multiple vulnerabilities have been discovered in libvirt, the worst\n    of which may result in the execution of arbitrary commands.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5748.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81013",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81022",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81045",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81073",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81079",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81097",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81083",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81076",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81113",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81115",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81112",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81135",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81143",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01494",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8115",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528396",
                    "reference_id": "1528396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528396"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700",
                    "reference_id": "887700",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887700"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-07",
                    "reference_id": "GLSA-201804-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-07"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1396",
                    "reference_id": "RHSA-2018:1396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1929",
                    "reference_id": "RHSA-2018:1929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1929"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3576-1/",
                    "reference_id": "USN-3576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2018-5748"
            ],
            "risk_score": 1.5,
            "exploitability": "0.5",
            "weighted_severity": "3.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-re7g-2nvj-j3dp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56777?format=api",
            "vulnerability_id": "VCID-rkxf-jp2j-mqgf",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82133",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8228",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8224",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82264",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82276",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82146",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82168",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82164",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8219",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82198",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82217",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82204",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4213"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/102295"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195",
                    "reference_id": "1525195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806",
                    "reference_id": "884806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15124",
                    "reference_id": "CVE-2017-15124",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15124"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816",
                    "reference_id": "RHSA-2018:0816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104",
                    "reference_id": "RHSA-2018:1104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113",
                    "reference_id": "RHSA-2018:1113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3062",
                    "reference_id": "RHSA-2018:3062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3062"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-15124"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkxf-jp2j-mqgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56781?format=api",
            "vulnerability_id": "VCID-rxsw-t1ut-rkau",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18043.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18043.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32946",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32981",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32804",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32852",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32881",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32882",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32844",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32818",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3286",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32837",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32801",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32651",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32536",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32452",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536377",
                    "reference_id": "1536377",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1536377"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-18043"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rxsw-t1ut-rkau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56783?format=api",
            "vulnerability_id": "VCID-uryz-5yk9-9fd7",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24463",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24581",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24617",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24395",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24507",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24421",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24437",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24429",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24404",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24289",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24275",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24235",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798",
                    "reference_id": "1549798",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041",
                    "reference_id": "892041",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1369",
                    "reference_id": "RHSA-2018:1369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1369"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1643",
                    "reference_id": "RHSA-2018:1643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1644",
                    "reference_id": "RHSA-2018:1644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1644"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1645",
                    "reference_id": "RHSA-2018:1645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1645"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1646",
                    "reference_id": "RHSA-2018:1646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1646"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2462",
                    "reference_id": "RHSA-2018:2462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2462"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3649-1/",
                    "reference_id": "USN-3649-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3649-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2018-7550"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uryz-5yk9-9fd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=api",
            "vulnerability_id": "VCID-v8fp-rzfq-e3bs",
            "summary": "Information leak via side effects of speculative execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.995",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99501",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.89042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.89147",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99538",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99542",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99539",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102376",
                    "reference_id": "102376",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102376"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040071",
                    "reference_id": "1040071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780",
                    "reference_id": "1519780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/180049",
                    "reference_id": "180049",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/180049"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/36",
                    "reference_id": "36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jun/36"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/43427/",
                    "reference_id": "43427",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/43427/"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
                    "reference_id": "4609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
                    "reference_id": "4611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
                    "reference_id": "4613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
                    "reference_id": "4614",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/584653",
                    "reference_id": "584653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.kb.cert.org/vuls/id/584653"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532",
                    "reference_id": "886532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852",
                    "reference_id": "886852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
                    "reference_id": "ADV180002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "advisory-254.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-254.html"
                },
                {
                    "reference_url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_id": "advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
                    "reference_id": "ARUBA-PSA-2018-001.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
                    "reference_id": "ARUBA-PSA-2019-003.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-10",
                    "reference_id": "ASA-201801-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-557",
                    "reference_id": "AVG-557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-557"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-558",
                    "reference_id": "AVG-558",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-558"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-559",
                    "reference_id": "AVG-559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-559"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-582",
                    "reference_id": "AVG-582",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-582"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-583",
                    "reference_id": "AVG-583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-583"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-987",
                    "reference_id": "AVG-987",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-987"
                },
                {
                    "reference_url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
                    "reference_id": "AWS-2018-013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
                    "reference_id": "cisco-sa-20180104-cpusidechannel",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
                },
                {
                    "reference_url": "https://support.citrix.com/article/CTX231399",
                    "reference_id": "CTX231399",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.citrix.com/article/CTX231399"
                },
                {
                    "reference_url": "https://security.paloaltonetworks.com/CVE-2017-5715",
                    "reference_id": "CVE-2017-5715",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.paloaltonetworks.com/CVE-2017-5715"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"
                },
                {
                    "reference_url": "https://spectreattack.com/spectre.pdf",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://spectreattack.com/spectre.pdf"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
                    "reference_id": "display?docId=emr_na-hpesbhf03805en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
                },
                {
                    "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_id": "FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K91229003",
                    "reference_id": "K91229003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K91229003"
                },
                {
                    "reference_url": "https://support.lenovo.com/us/en/solutions/LEN-18282",
                    "reference_id": "LEN-18282",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
                },
                {
                    "reference_url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
                    "reference_id": "mitel-product-security-advisory-18-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
                },
                {
                    "reference_url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
                    "reference_id": "mitigations-landing-new-class-timing-attack",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
                    "reference_id": "msg00009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
                    "reference_id": "msg00012.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
                    "reference_id": "msg00013.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180104-0001/",
                    "reference_id": "ntap-20180104-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
                },
                {
                    "reference_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
                    "reference_id": "reading-privileged-memory-with-side.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016",
                    "reference_id": "RHSA-2018:0016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017",
                    "reference_id": "RHSA-2018:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018",
                    "reference_id": "RHSA-2018:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0018"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020",
                    "reference_id": "RHSA-2018:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021",
                    "reference_id": "RHSA-2018:0021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022",
                    "reference_id": "RHSA-2018:0022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0023",
                    "reference_id": "RHSA-2018:0023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0023"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0027",
                    "reference_id": "RHSA-2018:0027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0027"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0028",
                    "reference_id": "RHSA-2018:0028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292",
                    "reference_id": "RHSA-2018:0292",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062",
                    "reference_id": "RHSA-2018:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129",
                    "reference_id": "RHSA-2018:1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1130",
                    "reference_id": "RHSA-2018:1130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1196",
                    "reference_id": "RHSA-2018:1196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1196"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1216",
                    "reference_id": "RHSA-2018:1216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1252",
                    "reference_id": "RHSA-2018:1252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1252"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319",
                    "reference_id": "RHSA-2018:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346",
                    "reference_id": "RHSA-2018:1346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967",
                    "reference_id": "RHSA-2018:1967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1967"
                },
                {
                    "reference_url": "https://spectreattack.com/",
                    "reference_id": "spectreattack.com",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://spectreattack.com/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_id": "Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
                },
                {
                    "reference_url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
                    "reference_id": "speculativeexecution",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
                },
                {
                    "reference_url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
                    "reference_id": "speculative-processor-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
                    "reference_id": "ssa-608355.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
                },
                {
                    "reference_url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
                    "reference_id": "suse-addresses-meltdown-spectre-vulnerabilities",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_18_01",
                    "reference_id": "Synology_SA_18_01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_18_01"
                },
                {
                    "reference_url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
                    "reference_id": "todays-cpu-vulnerability-what-you-need.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/usn/usn-3516-1/",
                    "reference_id": "usn-3516-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/usn/usn-3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3516-1/",
                    "reference_id": "USN-3516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3530-1/",
                    "reference_id": "USN-3530-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3530-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-1/",
                    "reference_id": "USN-3531-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-3/",
                    "reference_id": "USN-3531-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-1/",
                    "reference_id": "USN-3540-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-2/",
                    "reference_id": "USN-3540-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3540-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-1/",
                    "reference_id": "USN-3541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-2/",
                    "reference_id": "USN-3541-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3541-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-1/",
                    "reference_id": "USN-3542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3542-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-2/",
                    "reference_id": "USN-3542-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3542-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3549-1/",
                    "reference_id": "USN-3549-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3549-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3560-1/",
                    "reference_id": "USN-3560-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3560-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3561-1/",
                    "reference_id": "USN-3561-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3561-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3580-1/",
                    "reference_id": "USN-3580-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3580-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-1/",
                    "reference_id": "USN-3581-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-2/",
                    "reference_id": "USN-3581-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-1/",
                    "reference_id": "USN-3582-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-2/",
                    "reference_id": "USN-3582-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3594-1/",
                    "reference_id": "USN-3594-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3594-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-1/",
                    "reference_id": "USN-3597-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-2/",
                    "reference_id": "USN-3597-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3620-2/",
                    "reference_id": "USN-3620-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3620-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3690-1/",
                    "reference_id": "USN-3690-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3690-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3777-3/",
                    "reference_id": "USN-3777-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3777-3/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-002",
                    "reference_id": "vde-2018-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-003",
                    "reference_id": "vde-2018-003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
                    "reference_id": "VMSA-2018-0002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
                    "reference_id": "VMSA-2018-0004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
                },
                {
                    "reference_url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
                    "reference_id": "VMSA-2018-0007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "XSA-254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-254.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83166?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.11.1-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
                }
            ],
            "aliases": [
                "CVE-2017-5715"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.11.1-r1"
}