Lookup for vulnerable packages by Package URL.

GET /api/packages/84819?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "qemu",
    "version": "2.5.0-r1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.5.0-r2",
    "latest_non_vulnerable_version": "8.0.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60192?format=api",
            "vulnerability_id": "VCID-33jn-mjmh-7fc2",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=8b98a2f07175d46c3f7217639bd5e03f"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2694.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2694.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2695.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2695.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2696.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2696.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7512.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7512.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95662",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95661",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95612",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95621",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95626",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95629",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95638",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95641",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95646",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95645",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95647",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95656",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.2106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9566",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/30/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/30/3"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/78230",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/78230"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034527",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034527"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285061",
                    "reference_id": "1285061",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285061"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806741",
                    "reference_id": "806741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806741"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7512",
                    "reference_id": "CVE-2015-7512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7512"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2694",
                    "reference_id": "RHSA-2015:2694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2695",
                    "reference_id": "RHSA-2015:2695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2696",
                    "reference_id": "RHSA-2015:2696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2828-1/",
                    "reference_id": "USN-2828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2828-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-7512"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33jn-mjmh-7fc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60189?format=api",
            "vulnerability_id": "VCID-3yb2-bx65-1yaa",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6815.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6815.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81476",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81488",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81509",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81506",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81559",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81546",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8154",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81577",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81578",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81582",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01574",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81604",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260076",
                    "reference_id": "1260076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260076"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798101",
                    "reference_id": "798101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798101"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2745-1/",
                    "reference_id": "USN-2745-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2745-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-6815"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3yb2-bx65-1yaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60205?format=api",
            "vulnerability_id": "VCID-6dnf-5681-5yau",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=4ab0359a8ae182a7ac5c99609667273167703fab"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0084.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0084.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0086.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0086.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0087.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0087.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0088.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-0088.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1568.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1568.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56509",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56602",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56456",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56553",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56574",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56552",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56604",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56609",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56594",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56572",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56603",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/09/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/01/09/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/09/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/01/09/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/80191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/80191"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034859"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288532",
                    "reference_id": "1288532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1288532"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810527",
                    "reference_id": "810527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810527"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1568",
                    "reference_id": "CVE-2016-1568",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1568"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0084",
                    "reference_id": "RHSA-2016:0084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0084"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0086",
                    "reference_id": "RHSA-2016:0086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0086"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0087",
                    "reference_id": "RHSA-2016:0087",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0087"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:0088",
                    "reference_id": "RHSA-2016:0088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:0088"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2016-1568"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dnf-5681-5yau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60197?format=api",
            "vulnerability_id": "VCID-72b8-m9rg-u7a4",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=156a2e4dbffa85997636a7a39ef12da6f1b40254"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8558.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8558.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13688",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1368",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13732",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13882",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13683",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13766",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13816",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13785",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13748",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13699",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1361",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13606",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02124.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/14/16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/14/16"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/14/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/14/9"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/80694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/80694"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277983",
                    "reference_id": "1277983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277983"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808144",
                    "reference_id": "808144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808144"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8558",
                    "reference_id": "CVE-2015-8558",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8558"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8558"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-72b8-m9rg-u7a4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4017?format=api",
            "vulnerability_id": "VCID-8q9q-fs5n-gyfj",
            "summary": "Privilege escalation via emulated floppy disk drive",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.32263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96809",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.32263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96816",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.32263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96841",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.32263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96845",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.32263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96848",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.36084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97092",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.36084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97093",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.36084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97094",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.36084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97079",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.36084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97088",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.36084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97089",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3456"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218611",
                    "reference_id": "1218611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218611"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424",
                    "reference_id": "785424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c",
                    "reference_id": "CVE-2015-3456;OSVDB-122072",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c"
                },
                {
                    "reference_url": "https://marc.info/?l=oss-security&m=143155206320935&w=2",
                    "reference_id": "CVE-2015-3456;OSVDB-122072",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://marc.info/?l=oss-security&m=143155206320935&w=2"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-03",
                    "reference_id": "GLSA-201604-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-27",
                    "reference_id": "GLSA-201612-27",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201612-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0998",
                    "reference_id": "RHSA-2015:0998",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0998"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0999",
                    "reference_id": "RHSA-2015:0999",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0999"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1000",
                    "reference_id": "RHSA-2015:1000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1000"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1001",
                    "reference_id": "RHSA-2015:1001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1001"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1002",
                    "reference_id": "RHSA-2015:1002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1002"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1003",
                    "reference_id": "RHSA-2015:1003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1003"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1004",
                    "reference_id": "RHSA-2015:1004",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1004"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1011",
                    "reference_id": "RHSA-2015:1011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1031",
                    "reference_id": "RHSA-2015:1031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1031"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2608-1/",
                    "reference_id": "USN-2608-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2608-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-133.html",
                    "reference_id": "XSA-133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-133.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-3456"
            ],
            "risk_score": 0.6,
            "exploitability": "2.0",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60196?format=api",
            "vulnerability_id": "VCID-9zjg-8t8b-a3ed",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/134948/Gentoo-QEMU-Local-Privilege-Escalation.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8556.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8556.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8556",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95683",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95679",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95682",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95632",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95641",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95646",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95657",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95661",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95666",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95665",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.21208",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95675",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8556"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/39010/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.exploit-db.com/exploits/39010/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292211",
                    "reference_id": "1292211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1292211"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39010.c",
                    "reference_id": "CVE-2015-8556",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/39010.c"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8556",
                    "reference_id": "CVE-2015-8556",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8556"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8556"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zjg-8t8b-a3ed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60185?format=api",
            "vulnerability_id": "VCID-cr8f-zaj3-mkg5",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165484.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166798.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1772.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1772.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1837.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1837.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5225.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5225.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37614",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37855",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3779",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37972",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37997",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37876",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37926",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37938",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37955",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37918",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37893",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00167",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37939",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:H/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-08/msg02495.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg05832.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3348"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/08/21/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/08/21/6"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76506"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033547"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1255896",
                    "reference_id": "1255896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1255896"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796465",
                    "reference_id": "796465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796465"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5225",
                    "reference_id": "CVE-2015-5225",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5225"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1772",
                    "reference_id": "RHSA-2015:1772",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1772"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1837",
                    "reference_id": "RHSA-2015:1837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1837"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2724-1/",
                    "reference_id": "USN-2724-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2724-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-5225"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cr8f-zaj3-mkg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4045?format=api",
            "vulnerability_id": "VCID-dhgj-d3h1-cue7",
            "summary": "heap buffer overflow vulnerability in pcnet emulator",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2694.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2694.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2695.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2695.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2696.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2696.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73814",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73789",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73691",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73701",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73696",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73731",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73744",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73748",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73739",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73781",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/30/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/30/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/78227",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/78227"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034268"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-162.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://xenbits.xen.org/xsa/advisory-162.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261461",
                    "reference_id": "1261461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261461"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742",
                    "reference_id": "806742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7504",
                    "reference_id": "CVE-2015-7504",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7504"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201604-03",
                    "reference_id": "GLSA-201604-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201604-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2694",
                    "reference_id": "RHSA-2015:2694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2694"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2695",
                    "reference_id": "RHSA-2015:2695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2695"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2696",
                    "reference_id": "RHSA-2015:2696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2696"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2828-1/",
                    "reference_id": "USN-2828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2828-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-162.html",
                    "reference_id": "XSA-162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-162.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-7504"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dhgj-d3h1-cue7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60194?format=api",
            "vulnerability_id": "VCID-eu1x-b3tw-dyfh",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8345.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8345.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21299",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21447",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21443",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21611",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21668",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21424",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21501",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2156",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21533",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21478",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21473",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-10/msg03911.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/11/25/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/11/25/11"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77985"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285213",
                    "reference_id": "1285213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1285213"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806373",
                    "reference_id": "806373",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806373"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8345",
                    "reference_id": "CVE-2015-8345",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8345"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2828-1/",
                    "reference_id": "USN-2828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2828-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8345"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eu1x-b3tw-dyfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60203?format=api",
            "vulnerability_id": "VCID-g7vj-24gg-uka5",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8744.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8744.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20627",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20795",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20941",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20999",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20715",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20792",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20826",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20773",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20764",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20756",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00067",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20743",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1270871",
                    "reference_id": "1270871",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1270871"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8744"
            ],
            "risk_score": 0.6,
            "exploitability": "0.5",
            "weighted_severity": "1.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g7vj-24gg-uka5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60199?format=api",
            "vulnerability_id": "VCID-gjq3-asym-bqat",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8568.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8568.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18809",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18919",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18995",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1913",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18898",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18977",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19031",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19039",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18992",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18941",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18894",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18907",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/15/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/15/10"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79721"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289816",
                    "reference_id": "1289816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289816"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145",
                    "reference_id": "808145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8568",
                    "reference_id": "CVE-2015-8568",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8568"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8568"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gjq3-asym-bqat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60202?format=api",
            "vulnerability_id": "VCID-h2ap-vhnd-gbcb",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8743.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8743.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19791",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19935",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20081",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20138",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19866",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19946",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2002",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19917",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19895",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.199",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00064",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19897",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264929",
                    "reference_id": "1264929",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264929"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810519",
                    "reference_id": "810519",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=810519"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8743"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ap-vhnd-gbcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60184?format=api",
            "vulnerability_id": "VCID-h526-pk3x-xfb7",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1931.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1931.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1943.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1943.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90321",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90309",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90306",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90249",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90251",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90264",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90269",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90284",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90291",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90298",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90293",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1779"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3259"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/03/24/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/03/24/9"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/04/09/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/04/09/6"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/73303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/73303"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033975"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2608-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2608-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199572",
                    "reference_id": "1199572",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199572"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781250",
                    "reference_id": "781250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781250"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.3.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1779",
                    "reference_id": "CVE-2015-1779",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1779"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1931",
                    "reference_id": "RHSA-2015:1931",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1931"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1943",
                    "reference_id": "RHSA-2015:1943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1943"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2608-1/",
                    "reference_id": "USN-2608-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2608-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-1779"
            ],
            "risk_score": 3.9,
            "exploitability": "0.5",
            "weighted_severity": "7.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h526-pk3x-xfb7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60188?format=api",
            "vulnerability_id": "VCID-hqnb-2gxt-rke6",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5745.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5745.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81024",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.833",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83315",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83339",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83348",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83284",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83357",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83353",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83389",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8339",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83391",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01921",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83363",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:H/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1251157",
                    "reference_id": "1251157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1251157"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795087",
                    "reference_id": "795087",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795087"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2724-1/",
                    "reference_id": "USN-2724-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2724-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-5745"
            ],
            "risk_score": 0.8,
            "exploitability": "0.5",
            "weighted_severity": "1.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hqnb-2gxt-rke6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60187?format=api",
            "vulnerability_id": "VCID-ku9y-24pu-g7gz",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5279.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5279.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93099",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93109",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93112",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93111",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93119",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93124",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93146",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9315",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93157",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.10195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93163",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256672",
                    "reference_id": "1256672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256672"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799074",
                    "reference_id": "799074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799074"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1896",
                    "reference_id": "RHSA-2015:1896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1896"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1923",
                    "reference_id": "RHSA-2015:1923",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1923"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1924",
                    "reference_id": "RHSA-2015:1924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1924"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1925",
                    "reference_id": "RHSA-2015:1925",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1925"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2065",
                    "reference_id": "RHSA-2015:2065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2065"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2745-1/",
                    "reference_id": "USN-2745-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2745-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-5279"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ku9y-24pu-g7gz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60190?format=api",
            "vulnerability_id": "VCID-njfq-vdgj-wfc8",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168602.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169036.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169039.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169327.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169341.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167369.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00019.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6855.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6855.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90503",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9049",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90434",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90439",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90451",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90456",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90468",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90474",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90482",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90475",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90492",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05769",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90491",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-6855"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-09/msg02479.html"
                },
                {
                    "reference_url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1188-security-advisory-14"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3361"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3362",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3362"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/10/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/10/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/10/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/10/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/76691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/76691"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2745-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2745-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260080",
                    "reference_id": "1260080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260080"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:arista:eos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6855",
                    "reference_id": "CVE-2015-6855",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6855"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2745-1/",
                    "reference_id": "USN-2745-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2745-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-6855"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-njfq-vdgj-wfc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60193?format=api",
            "vulnerability_id": "VCID-p5qs-eaj5-4bax",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=43b11a91dd861a946b231b89b754285"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175380.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7549.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7549.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30496",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30705",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30671",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30832",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30698",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30787",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3079",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30746",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30724",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/14/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/14/2"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/80761",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/80761"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291137",
                    "reference_id": "1291137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1291137"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808131",
                    "reference_id": "808131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808131"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:r1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7549",
                    "reference_id": "CVE-2015-7549",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7549"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-7549"
            ],
            "risk_score": 2.7,
            "exploitability": "0.5",
            "weighted_severity": "5.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p5qs-eaj5-4bax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60200?format=api",
            "vulnerability_id": "VCID-prnz-8kk8-fkhj",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8666.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8666.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23248",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23433",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23427",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23589",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23626",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23404",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23475",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23524",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23542",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23501",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23446",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23463",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23455",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8666"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/24/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/24/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79670"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283722",
                    "reference_id": "1283722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1283722"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8666",
                    "reference_id": "CVE-2015-8666",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P"
                        },
                        {
                            "value": "7.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8666"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8666"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-prnz-8kk8-fkhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60198?format=api",
            "vulnerability_id": "VCID-rwea-a658-bfbm",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176503.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176558.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175967.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176300.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00087.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00049.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00017.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00058.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00003.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8567.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8567.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87653",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87638",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87636",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87568",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87578",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87591",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87594",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87613",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87619",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87631",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87626",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03508",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87623",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2015-12/msg02299.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/15/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/15/10"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79721"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2891-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2891-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289816",
                    "reference_id": "1289816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289816"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145",
                    "reference_id": "808145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808145"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8567",
                    "reference_id": "CVE-2015-8567",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8567"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8567"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "6.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rwea-a658-bfbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60186?format=api",
            "vulnerability_id": "VCID-ucq7-rbw9-efc2",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5278.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5278.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82946",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82962",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82975",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82972",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82997",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83004",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8302",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83014",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8301",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83048",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8305",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83073",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5278"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256661",
                    "reference_id": "1256661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1256661"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799073",
                    "reference_id": "799073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799073"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2745-1/",
                    "reference_id": "USN-2745-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2745-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-5278"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucq7-rbw9-efc2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60191?format=api",
            "vulnerability_id": "VCID-vgar-q6tq-ufc5",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169624.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169767.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169802.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7295.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7295.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87774",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8769",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87701",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87715",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87736",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87742",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87753",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87747",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87745",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87759",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87758",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/18/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/18/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/18/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/09/18/9"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82672"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264381",
                    "reference_id": "1264381",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1264381"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799452",
                    "reference_id": "799452",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799452"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7295",
                    "reference_id": "CVE-2015-7295",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7295"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2828-1/",
                    "reference_id": "USN-2828-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2828-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-7295"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vgar-q6tq-ufc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60195?format=api",
            "vulnerability_id": "VCID-wj3c-7a67-ffd1",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://git.qemu-project.org/?p=qemu.git%3Ba=commitdiff%3Bh=4c65fed8bdf96780735dbdb92a8"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8504.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8504.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86174",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86153",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86084",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.861",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86099",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86118",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8613",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86144",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86143",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86139",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86156",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02814",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86162",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3469"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3470"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3471"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/12/08/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/12/08/7"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/78708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/78708"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289541",
                    "reference_id": "1289541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1289541"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130",
                    "reference_id": "808130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=808130"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8504",
                    "reference_id": "CVE-2015-8504",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8504"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8504"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wj3c-7a67-ffd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60201?format=api",
            "vulnerability_id": "VCID-x6sp-admm-2bb4",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8701.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8701.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21404",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21572",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2163",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21385",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21462",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21522",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21534",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21495",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21434",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21441",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21408",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21261",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8701"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8701"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286971",
                    "reference_id": "1286971",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1286971"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809313",
                    "reference_id": "809313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809313"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8701"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6sp-admm-2bb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60204?format=api",
            "vulnerability_id": "VCID-zdcz-c2h2-dfde",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow a remote attacker to cause a Denial of Service or gain\n    elevated privileges from a guest VM.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8745.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8745.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20846",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21021",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21176",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21231",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20944",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21025",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21084",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21102",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21058",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21006",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20996",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20975",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1270876",
                    "reference_id": "1270876",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1270876"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201602-01",
                    "reference_id": "GLSA-201602-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201602-01"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2891-1/",
                    "reference_id": "USN-2891-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2891-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84819?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.5.0-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
                }
            ],
            "aliases": [
                "CVE-2015-8745"
            ],
            "risk_score": 0.4,
            "exploitability": "0.5",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zdcz-c2h2-dfde"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.5.0-r1"
}