Lookup for vulnerable packages by Package URL.

GET /api/packages/85778?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
    "type": "ebuild",
    "namespace": "app-emulation",
    "name": "qemu",
    "version": "2.7.0-r6",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.8.0",
    "latest_non_vulnerable_version": "8.0.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61921?format=api",
            "vulnerability_id": "VCID-1c93-u2ze-jyg9",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7994.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7994.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35499",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.357",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35727",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35607",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35677",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3562",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35659",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35649",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35598",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7994"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382666",
                    "reference_id": "1382666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382666"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840228",
                    "reference_id": "840228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840228"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7994"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1c93-u2ze-jyg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61922?format=api",
            "vulnerability_id": "VCID-33hx-334p-myag",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8576.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8576.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29957",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29999",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29861",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29923",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29959",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29964",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29917",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29868",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29886",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29866",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2982",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8576"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333425",
                    "reference_id": "1333425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333425"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840343",
                    "reference_id": "840343",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840343"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392",
                    "reference_id": "RHSA-2017:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408",
                    "reference_id": "RHSA-2017:2408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2408"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8576"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33hx-334p-myag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61919?format=api",
            "vulnerability_id": "VCID-5fu6-gkdc-sfhq",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7908.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7908.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7908",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32309",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3246",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32496",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32318",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32367",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32395",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32397",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32359",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32332",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32369",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32346",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7908"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327465",
                    "reference_id": "1327465",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327465"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839835",
                    "reference_id": "839835",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839835"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7908"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fu6-gkdc-sfhq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61927?format=api",
            "vulnerability_id": "VCID-8822-6d2n-x7a6",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8909.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8909.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11073",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11279",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11092",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11172",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11205",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11044",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11053",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11185",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8909"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388052",
                    "reference_id": "1388052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388052"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841950",
                    "reference_id": "841950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841950"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392",
                    "reference_id": "RHSA-2017:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408",
                    "reference_id": "RHSA-2017:2408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2408"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8909"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8822-6d2n-x7a6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61917?format=api",
            "vulnerability_id": "VCID-91jh-3mv7-yuga",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7466.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7466.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26229",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26312",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26126",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26241",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26203",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26149",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26124",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26086",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7466"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377837",
                    "reference_id": "1377837",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377837"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838687",
                    "reference_id": "838687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838687"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392",
                    "reference_id": "RHSA-2017:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408",
                    "reference_id": "RHSA-2017:2408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2408"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7466"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-91jh-3mv7-yuga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61916?format=api",
            "vulnerability_id": "VCID-9p62-abss-v7c2",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7423.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7423.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33993",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34331",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34223",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34266",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34296",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34255",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34232",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34254",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00141",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3422",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7423"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376776",
                    "reference_id": "1376776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1376776"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838145",
                    "reference_id": "838145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838145"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7423"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p62-abss-v7c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61929?format=api",
            "vulnerability_id": "VCID-bnve-337x-4ya9",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27974",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28047",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28089",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27883",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2795",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27994",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27951",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27892",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27901",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00101",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2784",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9102"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389550",
                    "reference_id": "1389550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389550"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463",
                    "reference_id": "842463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-9102"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bnve-337x-4ya9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61924?format=api",
            "vulnerability_id": "VCID-e2th-bfpw-jfcz",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8578.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8578.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29517",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29584",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29455",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29557",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29559",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29514",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29462",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29481",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29453",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29407",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8578"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383291",
                    "reference_id": "1383291",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383291"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840340",
                    "reference_id": "840340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840340"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8578"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2th-bfpw-jfcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61923?format=api",
            "vulnerability_id": "VCID-eqw6-1x15-jqb9",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8577.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8577.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29517",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29584",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29633",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29455",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29557",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29559",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29514",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29462",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29481",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29453",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29407",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8577"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383285",
                    "reference_id": "1383285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1383285"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840341",
                    "reference_id": "840341",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840341"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8577"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eqw6-1x15-jqb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61920?format=api",
            "vulnerability_id": "VCID-ezt6-c9hq-m3aq",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7909.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7909.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33368",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33505",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33538",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33379",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33423",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33458",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33461",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3342",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33432",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33407",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33376",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7909"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329538",
                    "reference_id": "1329538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1329538"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839834",
                    "reference_id": "839834",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839834"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7909"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezt6-c9hq-m3aq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61918?format=api",
            "vulnerability_id": "VCID-g3p8-5y7v-1ubk",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7907.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7907.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29737",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29783",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2983",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29645",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29708",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29744",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29747",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29702",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29651",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29668",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29646",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29601",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7907"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327206",
                    "reference_id": "1327206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327206"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839986",
                    "reference_id": "839986",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839986"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3261-1/",
                    "reference_id": "USN-3261-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3261-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7907"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g3p8-5y7v-1ubk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61928?format=api",
            "vulnerability_id": "VCID-hu58-m2w7-qkeu",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8910.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8910.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27057",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2689",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26941",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26951",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27097",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27133",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26925",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26993",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27039",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26998",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8910"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388046",
                    "reference_id": "1388046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388046"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841955",
                    "reference_id": "841955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=841955"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392",
                    "reference_id": "RHSA-2017:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408",
                    "reference_id": "RHSA-2017:2408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2408"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8910"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hu58-m2w7-qkeu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61930?format=api",
            "vulnerability_id": "VCID-hvky-8ja9-rye5",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9103.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9103.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30467",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30541",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30351",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30412",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30446",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30448",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30404",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30356",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30373",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30354",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30311",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9103"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389642",
                    "reference_id": "1389642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389642"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463",
                    "reference_id": "842463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-9103"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvky-8ja9-rye5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61915?format=api",
            "vulnerability_id": "VCID-j8gw-y7cy-wkdh",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7161.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7161.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95465",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95485",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95491",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95494",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.955",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95501",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95502",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95511",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95516",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.20198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95518",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7161"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379297",
                    "reference_id": "1379297",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379297"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838850",
                    "reference_id": "838850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838850"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-7161"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8gw-y7cy-wkdh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61931?format=api",
            "vulnerability_id": "VCID-kcqg-23j8-bqaa",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9104.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9104.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30323",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30354",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30401",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30216",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30276",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30311",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30315",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3027",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30224",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30238",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3022",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30175",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9104"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389686",
                    "reference_id": "1389686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389686"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463",
                    "reference_id": "842463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-9104"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcqg-23j8-bqaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61926?format=api",
            "vulnerability_id": "VCID-ujfw-wu9c-2ff3",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8669.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8669.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26229",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26312",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26126",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26193",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26241",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26203",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26149",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26124",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26086",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384909",
                    "reference_id": "1384909",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384909"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840945",
                    "reference_id": "840945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840945"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2392",
                    "reference_id": "RHSA-2017:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2408",
                    "reference_id": "RHSA-2017:2408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2408"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3261-1/",
                    "reference_id": "USN-3261-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3261-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8669"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujfw-wu9c-2ff3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61925?format=api",
            "vulnerability_id": "VCID-whgj-3n1x-yyes",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8668.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8668.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35499",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.357",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35727",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35607",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35677",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3562",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35659",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35649",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35598",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8668"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384896",
                    "reference_id": "1384896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384896"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840948",
                    "reference_id": "840948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840948"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-8668"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whgj-3n1x-yyes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61932?format=api",
            "vulnerability_id": "VCID-z4u5-1yy5-ruhb",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9105.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9105.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28297",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28369",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28411",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28202",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28269",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28312",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28317",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28273",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28216",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28228",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28211",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00103",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28165",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9105"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389702",
                    "reference_id": "1389702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1389702"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463",
                    "reference_id": "842463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842463"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3125-1/",
                    "reference_id": "USN-3125-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3125-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-9105"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z4u5-1yy5-ruhb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61914?format=api",
            "vulnerability_id": "VCID-zyd2-vtc3-k7d3",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which could cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10029.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10029.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21443",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21611",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21668",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21424",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21501",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2156",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21533",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21478",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21473",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21479",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21447",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406390",
                    "reference_id": "1406390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406390"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201611-11",
                    "reference_id": "GLSA-201611-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201611-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3261-1/",
                    "reference_id": "USN-3261-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3261-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/85778?format=api",
                    "purl": "pkg:ebuild/app-emulation/qemu@2.7.0-r6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
                }
            ],
            "aliases": [
                "CVE-2016-10029"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zyd2-vtc3-k7d3"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/qemu@2.7.0-r6"
}