Lookup for vulnerable packages by Package URL.

GET /api/packages/937092?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "qemu",
    "version": "1:2.12~rc3+dfsg-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1:3.1+dfsg-1",
    "latest_non_vulnerable_version": "1:11.0.0+ds-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56778?format=api",
            "vulnerability_id": "VCID-d8cd-qgg7-fyed",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16845.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83891",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83985",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8397",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83964",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83984",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83924",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83948",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83954",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/qemu-devel/2017-11/msg02982.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4213"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/101923",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/101923"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514148",
                    "reference_id": "1514148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1514148"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136",
                    "reference_id": "882136",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882136"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16845",
                    "reference_id": "CVE-2017-16845",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16845"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3649-1/",
                    "reference_id": "USN-3649-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3649-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
                    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937037?format=api",
                    "purl": "pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3kyg-9mf3-kfft"
                        },
                        {
                            "vulnerability": "VCID-6qnt-yaa3-p3bb"
                        },
                        {
                            "vulnerability": "VCID-cenj-mz55-jbg6"
                        },
                        {
                            "vulnerability": "VCID-d2ve-dnmj-4bbz"
                        },
                        {
                            "vulnerability": "VCID-ej5p-r4az-6ud2"
                        },
                        {
                            "vulnerability": "VCID-ewb7-nrtu-g7ex"
                        },
                        {
                            "vulnerability": "VCID-gc6n-kgsc-f3b6"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-mtj9-1cns-yybw"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-p2dz-mtns-5bb4"
                        },
                        {
                            "vulnerability": "VCID-ptty-88p4-ybe9"
                        },
                        {
                            "vulnerability": "VCID-pxjg-chmx-nkdc"
                        },
                        {
                            "vulnerability": "VCID-qh2s-apkz-sbaz"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-t5gq-4bhn-gkej"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-w7gc-1eh2-3ufu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937035?format=api",
                    "purl": "pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hkf8-96k7-kuc9"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937040?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937038?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937039?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076120?format=api",
                    "purl": "pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16845"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8cd-qgg7-fyed"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56782?format=api",
            "vulnerability_id": "VCID-jnxy-g6wu-8ubu",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5683.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07682",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07714",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0774",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07759",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07758",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07744",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.08025",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0801",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356",
                    "reference_id": "1530356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1530356"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392",
                    "reference_id": "887392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887392"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816",
                    "reference_id": "RHSA-2018:0816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104",
                    "reference_id": "RHSA-2018:1104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113",
                    "reference_id": "RHSA-2018:1113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162",
                    "reference_id": "RHSA-2018:2162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2162"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
                    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937037?format=api",
                    "purl": "pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3kyg-9mf3-kfft"
                        },
                        {
                            "vulnerability": "VCID-6qnt-yaa3-p3bb"
                        },
                        {
                            "vulnerability": "VCID-cenj-mz55-jbg6"
                        },
                        {
                            "vulnerability": "VCID-d2ve-dnmj-4bbz"
                        },
                        {
                            "vulnerability": "VCID-ej5p-r4az-6ud2"
                        },
                        {
                            "vulnerability": "VCID-ewb7-nrtu-g7ex"
                        },
                        {
                            "vulnerability": "VCID-gc6n-kgsc-f3b6"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-mtj9-1cns-yybw"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-p2dz-mtns-5bb4"
                        },
                        {
                            "vulnerability": "VCID-ptty-88p4-ybe9"
                        },
                        {
                            "vulnerability": "VCID-pxjg-chmx-nkdc"
                        },
                        {
                            "vulnerability": "VCID-qh2s-apkz-sbaz"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-t5gq-4bhn-gkej"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-w7gc-1eh2-3ufu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937035?format=api",
                    "purl": "pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hkf8-96k7-kuc9"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937040?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937038?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937039?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076120?format=api",
                    "purl": "pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-5683"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnxy-g6wu-8ubu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83605?format=api",
            "vulnerability_id": "VCID-jq6v-ra9m-sqgz",
            "summary": "QEMU: cirrus: OOB access when updating VGA display",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7858.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7858.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17159",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17324",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17372",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17242",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.173",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17314",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17264",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17205",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17144",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1715",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17185",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7858"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402",
                    "reference_id": "1553402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553402"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892497",
                    "reference_id": "892497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1369",
                    "reference_id": "RHSA-2018:1369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1369"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1416",
                    "reference_id": "RHSA-2018:1416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1416"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1643",
                    "reference_id": "RHSA-2018:1643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1644",
                    "reference_id": "RHSA-2018:1644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1644"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1645",
                    "reference_id": "RHSA-2018:1645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1645"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1646",
                    "reference_id": "RHSA-2018:1646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1646"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162",
                    "reference_id": "RHSA-2018:2162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2162"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3649-1/",
                    "reference_id": "USN-3649-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3649-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
                    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937037?format=api",
                    "purl": "pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3kyg-9mf3-kfft"
                        },
                        {
                            "vulnerability": "VCID-6qnt-yaa3-p3bb"
                        },
                        {
                            "vulnerability": "VCID-cenj-mz55-jbg6"
                        },
                        {
                            "vulnerability": "VCID-d2ve-dnmj-4bbz"
                        },
                        {
                            "vulnerability": "VCID-ej5p-r4az-6ud2"
                        },
                        {
                            "vulnerability": "VCID-ewb7-nrtu-g7ex"
                        },
                        {
                            "vulnerability": "VCID-gc6n-kgsc-f3b6"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-mtj9-1cns-yybw"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-p2dz-mtns-5bb4"
                        },
                        {
                            "vulnerability": "VCID-ptty-88p4-ybe9"
                        },
                        {
                            "vulnerability": "VCID-pxjg-chmx-nkdc"
                        },
                        {
                            "vulnerability": "VCID-qh2s-apkz-sbaz"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-t5gq-4bhn-gkej"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-w7gc-1eh2-3ufu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937035?format=api",
                    "purl": "pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hkf8-96k7-kuc9"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937040?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937038?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937039?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076120?format=api",
                    "purl": "pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-7858"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jq6v-ra9m-sqgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56777?format=api",
            "vulnerability_id": "VCID-rkxf-jp2j-mqgf",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15124.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82133",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82242",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82217",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82204",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8224",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82146",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82168",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82164",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8219",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82198",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:S/C:N/I:N/A:C"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4213",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2018/dsa-4213"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102295",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/102295"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195",
                    "reference_id": "1525195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525195"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806",
                    "reference_id": "884806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884806"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15124",
                    "reference_id": "CVE-2017-15124",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15124"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0816",
                    "reference_id": "RHSA-2018:0816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1104",
                    "reference_id": "RHSA-2018:1104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1113",
                    "reference_id": "RHSA-2018:1113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3062",
                    "reference_id": "RHSA-2018:3062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3062"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3575-1/",
                    "reference_id": "USN-3575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3575-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
                    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937037?format=api",
                    "purl": "pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3kyg-9mf3-kfft"
                        },
                        {
                            "vulnerability": "VCID-6qnt-yaa3-p3bb"
                        },
                        {
                            "vulnerability": "VCID-cenj-mz55-jbg6"
                        },
                        {
                            "vulnerability": "VCID-d2ve-dnmj-4bbz"
                        },
                        {
                            "vulnerability": "VCID-ej5p-r4az-6ud2"
                        },
                        {
                            "vulnerability": "VCID-ewb7-nrtu-g7ex"
                        },
                        {
                            "vulnerability": "VCID-gc6n-kgsc-f3b6"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-mtj9-1cns-yybw"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-p2dz-mtns-5bb4"
                        },
                        {
                            "vulnerability": "VCID-ptty-88p4-ybe9"
                        },
                        {
                            "vulnerability": "VCID-pxjg-chmx-nkdc"
                        },
                        {
                            "vulnerability": "VCID-qh2s-apkz-sbaz"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-t5gq-4bhn-gkej"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-w7gc-1eh2-3ufu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937035?format=api",
                    "purl": "pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hkf8-96k7-kuc9"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937040?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937038?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937039?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076120?format=api",
                    "purl": "pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-15124"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkxf-jp2j-mqgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56783?format=api",
            "vulnerability_id": "VCID-uryz-5yk9-9fd7",
            "summary": "Multiple vulnerabilities have been found in QEMU, the worst of\n    which may allow an attacker to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7550.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24463",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24581",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24617",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24395",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24507",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24523",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24479",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24421",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24437",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24429",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24404",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798",
                    "reference_id": "1549798",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1549798"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041",
                    "reference_id": "892041",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892041"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1369",
                    "reference_id": "RHSA-2018:1369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1369"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1643",
                    "reference_id": "RHSA-2018:1643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1644",
                    "reference_id": "RHSA-2018:1644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1644"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1645",
                    "reference_id": "RHSA-2018:1645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1645"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1646",
                    "reference_id": "RHSA-2018:1646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1646"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2462",
                    "reference_id": "RHSA-2018:2462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2462"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3649-1/",
                    "reference_id": "USN-3649-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3649-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
                    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937037?format=api",
                    "purl": "pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3kyg-9mf3-kfft"
                        },
                        {
                            "vulnerability": "VCID-6qnt-yaa3-p3bb"
                        },
                        {
                            "vulnerability": "VCID-cenj-mz55-jbg6"
                        },
                        {
                            "vulnerability": "VCID-d2ve-dnmj-4bbz"
                        },
                        {
                            "vulnerability": "VCID-ej5p-r4az-6ud2"
                        },
                        {
                            "vulnerability": "VCID-ewb7-nrtu-g7ex"
                        },
                        {
                            "vulnerability": "VCID-gc6n-kgsc-f3b6"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-mtj9-1cns-yybw"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-p2dz-mtns-5bb4"
                        },
                        {
                            "vulnerability": "VCID-ptty-88p4-ybe9"
                        },
                        {
                            "vulnerability": "VCID-pxjg-chmx-nkdc"
                        },
                        {
                            "vulnerability": "VCID-qh2s-apkz-sbaz"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-t5gq-4bhn-gkej"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-w7gc-1eh2-3ufu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937035?format=api",
                    "purl": "pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hkf8-96k7-kuc9"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937040?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937038?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937039?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076120?format=api",
                    "purl": "pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-7550"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uryz-5yk9-9fd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=api",
            "vulnerability_id": "VCID-v8fp-rzfq-e3bs",
            "summary": "Information leak via side effects of speculative execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.995",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99501",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99539",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102376",
                    "reference_id": "102376",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102376"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040071",
                    "reference_id": "1040071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780",
                    "reference_id": "1519780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/180049",
                    "reference_id": "180049",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/180049"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/36",
                    "reference_id": "36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jun/36"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/43427/",
                    "reference_id": "43427",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/43427/"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
                    "reference_id": "4609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
                    "reference_id": "4611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
                    "reference_id": "4613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
                    "reference_id": "4614",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/584653",
                    "reference_id": "584653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.kb.cert.org/vuls/id/584653"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532",
                    "reference_id": "886532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852",
                    "reference_id": "886852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
                    "reference_id": "ADV180002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "advisory-254.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-254.html"
                },
                {
                    "reference_url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_id": "advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
                    "reference_id": "ARUBA-PSA-2018-001.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
                    "reference_id": "ARUBA-PSA-2019-003.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-10",
                    "reference_id": "ASA-201801-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-557",
                    "reference_id": "AVG-557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-557"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-558",
                    "reference_id": "AVG-558",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-558"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-559",
                    "reference_id": "AVG-559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-559"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-582",
                    "reference_id": "AVG-582",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-582"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-583",
                    "reference_id": "AVG-583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-583"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-987",
                    "reference_id": "AVG-987",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-987"
                },
                {
                    "reference_url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
                    "reference_id": "AWS-2018-013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
                    "reference_id": "cisco-sa-20180104-cpusidechannel",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
                },
                {
                    "reference_url": "https://support.citrix.com/article/CTX231399",
                    "reference_id": "CTX231399",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.citrix.com/article/CTX231399"
                },
                {
                    "reference_url": "https://security.paloaltonetworks.com/CVE-2017-5715",
                    "reference_id": "CVE-2017-5715",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.paloaltonetworks.com/CVE-2017-5715"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"
                },
                {
                    "reference_url": "https://spectreattack.com/spectre.pdf",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://spectreattack.com/spectre.pdf"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
                    "reference_id": "display?docId=emr_na-hpesbhf03805en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
                },
                {
                    "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_id": "FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K91229003",
                    "reference_id": "K91229003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K91229003"
                },
                {
                    "reference_url": "https://support.lenovo.com/us/en/solutions/LEN-18282",
                    "reference_id": "LEN-18282",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
                },
                {
                    "reference_url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
                    "reference_id": "mitel-product-security-advisory-18-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
                },
                {
                    "reference_url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
                    "reference_id": "mitigations-landing-new-class-timing-attack",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
                    "reference_id": "msg00009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
                    "reference_id": "msg00012.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
                    "reference_id": "msg00013.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180104-0001/",
                    "reference_id": "ntap-20180104-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
                },
                {
                    "reference_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
                    "reference_id": "reading-privileged-memory-with-side.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016",
                    "reference_id": "RHSA-2018:0016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017",
                    "reference_id": "RHSA-2018:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018",
                    "reference_id": "RHSA-2018:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0018"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020",
                    "reference_id": "RHSA-2018:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021",
                    "reference_id": "RHSA-2018:0021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022",
                    "reference_id": "RHSA-2018:0022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0023",
                    "reference_id": "RHSA-2018:0023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0023"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0027",
                    "reference_id": "RHSA-2018:0027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0027"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0028",
                    "reference_id": "RHSA-2018:0028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292",
                    "reference_id": "RHSA-2018:0292",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062",
                    "reference_id": "RHSA-2018:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129",
                    "reference_id": "RHSA-2018:1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1130",
                    "reference_id": "RHSA-2018:1130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1196",
                    "reference_id": "RHSA-2018:1196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1196"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1216",
                    "reference_id": "RHSA-2018:1216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1252",
                    "reference_id": "RHSA-2018:1252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1252"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319",
                    "reference_id": "RHSA-2018:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346",
                    "reference_id": "RHSA-2018:1346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967",
                    "reference_id": "RHSA-2018:1967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1967"
                },
                {
                    "reference_url": "https://spectreattack.com/",
                    "reference_id": "spectreattack.com",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://spectreattack.com/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_id": "Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
                },
                {
                    "reference_url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
                    "reference_id": "speculativeexecution",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
                },
                {
                    "reference_url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
                    "reference_id": "speculative-processor-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
                    "reference_id": "ssa-608355.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
                },
                {
                    "reference_url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
                    "reference_id": "suse-addresses-meltdown-spectre-vulnerabilities",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_18_01",
                    "reference_id": "Synology_SA_18_01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_18_01"
                },
                {
                    "reference_url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
                    "reference_id": "todays-cpu-vulnerability-what-you-need.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/usn/usn-3516-1/",
                    "reference_id": "usn-3516-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/usn/usn-3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3516-1/",
                    "reference_id": "USN-3516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3530-1/",
                    "reference_id": "USN-3530-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3530-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-1/",
                    "reference_id": "USN-3531-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-3/",
                    "reference_id": "USN-3531-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-1/",
                    "reference_id": "USN-3540-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-2/",
                    "reference_id": "USN-3540-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3540-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-1/",
                    "reference_id": "USN-3541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-2/",
                    "reference_id": "USN-3541-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3541-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-1/",
                    "reference_id": "USN-3542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3542-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-2/",
                    "reference_id": "USN-3542-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3542-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3549-1/",
                    "reference_id": "USN-3549-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3549-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3560-1/",
                    "reference_id": "USN-3560-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3560-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3561-1/",
                    "reference_id": "USN-3561-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3561-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3580-1/",
                    "reference_id": "USN-3580-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3580-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-1/",
                    "reference_id": "USN-3581-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-2/",
                    "reference_id": "USN-3581-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-1/",
                    "reference_id": "USN-3582-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-2/",
                    "reference_id": "USN-3582-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3594-1/",
                    "reference_id": "USN-3594-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3594-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-1/",
                    "reference_id": "USN-3597-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-2/",
                    "reference_id": "USN-3597-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3620-2/",
                    "reference_id": "USN-3620-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3620-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3690-1/",
                    "reference_id": "USN-3690-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3690-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3777-3/",
                    "reference_id": "USN-3777-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3777-3/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-002",
                    "reference_id": "vde-2018-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-003",
                    "reference_id": "vde-2018-003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
                    "reference_id": "VMSA-2018-0002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
                    "reference_id": "VMSA-2018-0004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
                },
                {
                    "reference_url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
                    "reference_id": "VMSA-2018-0007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "XSA-254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-254.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937092?format=api",
                    "purl": "pkg:deb/debian/qemu@1:2.12~rc3%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937037?format=api",
                    "purl": "pkg:deb/debian/qemu@1:5.2%2Bdfsg-11%2Bdeb11u3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3kyg-9mf3-kfft"
                        },
                        {
                            "vulnerability": "VCID-6qnt-yaa3-p3bb"
                        },
                        {
                            "vulnerability": "VCID-cenj-mz55-jbg6"
                        },
                        {
                            "vulnerability": "VCID-d2ve-dnmj-4bbz"
                        },
                        {
                            "vulnerability": "VCID-ej5p-r4az-6ud2"
                        },
                        {
                            "vulnerability": "VCID-ewb7-nrtu-g7ex"
                        },
                        {
                            "vulnerability": "VCID-gc6n-kgsc-f3b6"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-mtj9-1cns-yybw"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-p2dz-mtns-5bb4"
                        },
                        {
                            "vulnerability": "VCID-ptty-88p4-ybe9"
                        },
                        {
                            "vulnerability": "VCID-pxjg-chmx-nkdc"
                        },
                        {
                            "vulnerability": "VCID-qh2s-apkz-sbaz"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-t5gq-4bhn-gkej"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-w7gc-1eh2-3ufu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:5.2%252Bdfsg-11%252Bdeb11u3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937035?format=api",
                    "purl": "pkg:deb/debian/qemu@1:7.2%2Bdfsg-7%2Bdeb12u18?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-hkf8-96k7-kuc9"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-t58m-9jqp-43c9"
                        },
                        {
                            "vulnerability": "VCID-uzxc-npak-yyc4"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:7.2%252Bdfsg-7%252Bdeb12u18%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937040?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.0.8%2Bds-0%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-n71j-fz74-kyhf"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.0.8%252Bds-0%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937038?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.1%2Bds-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-9szt-c829-zfdh"
                        },
                        {
                            "vulnerability": "VCID-detn-3zsq-3qh7"
                        },
                        {
                            "vulnerability": "VCID-m47q-17n6-t7gg"
                        },
                        {
                            "vulnerability": "VCID-vcun-y6d5-6uby"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.1%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/937039?format=api",
                    "purl": "pkg:deb/debian/qemu@1:10.2.2%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:10.2.2%252Bds-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076120?format=api",
                    "purl": "pkg:deb/debian/qemu@1:11.0.0%2Bds-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:11.0.0%252Bds-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-5715"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/qemu@1:2.12~rc3%252Bdfsg-1%3Fdistro=trixie"
}