Lookup for vulnerable packages by Package URL.

GET /api/packages/942213?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "virtualbox",
    "version": "5.2.6-dfsg-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.2.10-dfsg-1",
    "latest_non_vulnerable_version": "7.2.6-dfsg-4",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39897?format=api",
            "vulnerability_id": "VCID-22js-xq7x-syhx",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2676",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37471",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37589",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37506",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37535",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37423",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37612",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37489",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3754",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37553",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37567",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00165",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37533",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2676"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102699",
                    "reference_id": "102699",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:54Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102699"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:54Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2676"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22js-xq7x-syhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39906?format=api",
            "vulnerability_id": "VCID-6bav-pth5-g3fp",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39329",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2685"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102689",
                    "reference_id": "102689",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:52Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102689"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:52Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2685"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6bav-pth5-g3fp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39972?format=api",
            "vulnerability_id": "VCID-6hse-9ytw-77a8",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73257",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73167",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73218",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73254",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73264",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73157",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73188",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73162",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73198",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73212",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73237",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2698"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102688",
                    "reference_id": "102688",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:31Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102688"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:31Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/43878/",
                    "reference_id": "43878",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:31Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/43878/"
                },
                {
                    "reference_url": "https://blogs.securiteam.com/index.php/archives/3649",
                    "reference_id": "CVE-2018-2698",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://blogs.securiteam.com/index.php/archives/3649"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43878.md",
                    "reference_id": "CVE-2018-2698",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43878.md"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2698"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6hse-9ytw-77a8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39921?format=api",
            "vulnerability_id": "VCID-8ndb-ms9z-ffe3",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39329",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2687"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102691",
                    "reference_id": "102691",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:07Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102691"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:07Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2687"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ndb-ms9z-ffe3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39913?format=api",
            "vulnerability_id": "VCID-bywa-gvfr-c3ga",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39329",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2686"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102690",
                    "reference_id": "102690",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:55Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102690"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:19:55Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2686"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bywa-gvfr-c3ga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39930?format=api",
            "vulnerability_id": "VCID-hq6c-htk8-zkft",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39329",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2688"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102692",
                    "reference_id": "102692",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:02Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102692"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:02Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2688"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hq6c-htk8-zkft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39952?format=api",
            "vulnerability_id": "VCID-k564-k1kj-qfh1",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2690",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39329",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2690"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102694",
                    "reference_id": "102694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:19Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102694"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:19Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2690"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k564-k1kj-qfh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39971?format=api",
            "vulnerability_id": "VCID-tumg-4rxf-kuf4",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24125",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24301",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24162",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24148",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24172",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24335",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24187",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2423",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00082",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24147",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2694"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102687",
                    "reference_id": "102687",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:15Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102687"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:15Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2694"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tumg-4rxf-kuf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=api",
            "vulnerability_id": "VCID-v8fp-rzfq-e3bs",
            "summary": "Information leak via side effects of speculative execution",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.995",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.88597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99501",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99529",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.89094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99534",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99539",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.89198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99533",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:N/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102376",
                    "reference_id": "102376",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102376"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040071",
                    "reference_id": "1040071",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780",
                    "reference_id": "1519780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/180049",
                    "reference_id": "180049",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/180049"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jun/36",
                    "reference_id": "36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jun/36"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/43427/",
                    "reference_id": "43427",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/43427/"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
                    "reference_id": "4609",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
                    "reference_id": "4611",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
                    "reference_id": "4613",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
                },
                {
                    "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
                    "reference_id": "4614",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
                },
                {
                    "reference_url": "http://www.kb.cert.org/vuls/id/584653",
                    "reference_id": "584653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.kb.cert.org/vuls/id/584653"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532",
                    "reference_id": "886532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852",
                    "reference_id": "886852",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"
                },
                {
                    "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
                    "reference_id": "ADV180002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
                },
                {
                    "reference_url": "http://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "advisory-254.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://xenbits.xen.org/xsa/advisory-254.html"
                },
                {
                    "reference_url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_id": "advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
                    "reference_id": "ARUBA-PSA-2018-001.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
                },
                {
                    "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
                    "reference_id": "ARUBA-PSA-2019-003.txt",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201801-10",
                    "reference_id": "ASA-201801-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201801-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-557",
                    "reference_id": "AVG-557",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-557"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-558",
                    "reference_id": "AVG-558",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-558"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-559",
                    "reference_id": "AVG-559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-559"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-582",
                    "reference_id": "AVG-582",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-582"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-583",
                    "reference_id": "AVG-583",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-583"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-987",
                    "reference_id": "AVG-987",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-987"
                },
                {
                    "reference_url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
                    "reference_id": "AWS-2018-013",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel",
                    "reference_id": "cisco-sa-20180104-cpusidechannel",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
                },
                {
                    "reference_url": "https://support.citrix.com/article/CTX231399",
                    "reference_id": "CTX231399",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.citrix.com/article/CTX231399"
                },
                {
                    "reference_url": "https://security.paloaltonetworks.com/CVE-2017-5715",
                    "reference_id": "CVE-2017-5715",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.paloaltonetworks.com/CVE-2017-5715"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"
                },
                {
                    "reference_url": "https://spectreattack.com/spectre.pdf",
                    "reference_id": "CVE-2017-5753;CVE-2017-5715",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://spectreattack.com/spectre.pdf"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
                    "reference_id": "display?docId=emr_na-hpesbhf03805en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
                },
                {
                    "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
                },
                {
                    "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_id": "FreeBSD-SA-18:03.speculative_execution.asc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-08",
                    "reference_id": "GLSA-201804-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-08"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://support.f5.com/csp/article/K91229003",
                    "reference_id": "K91229003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.f5.com/csp/article/K91229003"
                },
                {
                    "reference_url": "https://support.lenovo.com/us/en/solutions/LEN-18282",
                    "reference_id": "LEN-18282",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
                },
                {
                    "reference_url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
                    "reference_id": "mitel-product-security-advisory-18-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
                },
                {
                    "reference_url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
                    "reference_id": "mitigations-landing-new-class-timing-attack",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html",
                    "reference_id": "msg00002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html",
                    "reference_id": "msg00003.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html",
                    "reference_id": "msg00004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html",
                    "reference_id": "msg00005.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html",
                    "reference_id": "msg00009.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html",
                    "reference_id": "msg00012.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html",
                    "reference_id": "msg00013.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
                    "reference_id": "msg00017.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html",
                    "reference_id": "msg00019.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html",
                    "reference_id": "msg00025.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180104-0001/",
                    "reference_id": "ntap-20180104-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
                },
                {
                    "reference_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
                    "reference_id": "reading-privileged-memory-with-side.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016",
                    "reference_id": "RHSA-2018:0016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0016"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017",
                    "reference_id": "RHSA-2018:0017",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0017"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018",
                    "reference_id": "RHSA-2018:0018",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0018"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020",
                    "reference_id": "RHSA-2018:0020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0020"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021",
                    "reference_id": "RHSA-2018:0021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0021"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022",
                    "reference_id": "RHSA-2018:0022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0022"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0023",
                    "reference_id": "RHSA-2018:0023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0023"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0027",
                    "reference_id": "RHSA-2018:0027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0027"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0028",
                    "reference_id": "RHSA-2018:0028",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0028"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292",
                    "reference_id": "RHSA-2018:0292",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0292"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062",
                    "reference_id": "RHSA-2018:1062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1062"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129",
                    "reference_id": "RHSA-2018:1129",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1129"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1130",
                    "reference_id": "RHSA-2018:1130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1130"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1196",
                    "reference_id": "RHSA-2018:1196",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1196"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1216",
                    "reference_id": "RHSA-2018:1216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1252",
                    "reference_id": "RHSA-2018:1252",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1252"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319",
                    "reference_id": "RHSA-2018:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346",
                    "reference_id": "RHSA-2018:1346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1346"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967",
                    "reference_id": "RHSA-2018:1967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1967"
                },
                {
                    "reference_url": "https://spectreattack.com/",
                    "reference_id": "spectreattack.com",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://spectreattack.com/"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_id": "Spectre-Information-Disclosure-Proof-Of-Concept.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
                },
                {
                    "reference_url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
                    "reference_id": "speculativeexecution",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
                },
                {
                    "reference_url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
                    "reference_id": "speculative-processor-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
                    "reference_id": "ssa-608355.pdf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
                },
                {
                    "reference_url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
                    "reference_id": "suse-addresses-meltdown-spectre-vulnerabilities",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
                },
                {
                    "reference_url": "https://www.synology.com/support/security/Synology_SA_18_01",
                    "reference_id": "Synology_SA_18_01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.synology.com/support/security/Synology_SA_18_01"
                },
                {
                    "reference_url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
                    "reference_id": "todays-cpu-vulnerability-what-you-need.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/usn/usn-3516-1/",
                    "reference_id": "usn-3516-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/usn/usn-3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3516-1/",
                    "reference_id": "USN-3516-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3516-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3530-1/",
                    "reference_id": "USN-3530-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3530-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-1/",
                    "reference_id": "USN-3531-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3531-3/",
                    "reference_id": "USN-3531-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3531-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-1/",
                    "reference_id": "USN-3540-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3540-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3540-2/",
                    "reference_id": "USN-3540-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3540-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-1/",
                    "reference_id": "USN-3541-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3541-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3541-2/",
                    "reference_id": "USN-3541-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3541-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-1/",
                    "reference_id": "USN-3542-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3542-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3542-2/",
                    "reference_id": "USN-3542-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3542-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3549-1/",
                    "reference_id": "USN-3549-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3549-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3560-1/",
                    "reference_id": "USN-3560-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3560-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3561-1/",
                    "reference_id": "USN-3561-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3561-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3580-1/",
                    "reference_id": "USN-3580-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3580-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-1/",
                    "reference_id": "USN-3581-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3581-2/",
                    "reference_id": "USN-3581-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3581-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-1/",
                    "reference_id": "USN-3582-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3582-2/",
                    "reference_id": "USN-3582-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3582-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3594-1/",
                    "reference_id": "USN-3594-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3594-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-1/",
                    "reference_id": "USN-3597-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3597-2/",
                    "reference_id": "USN-3597-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3597-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3620-2/",
                    "reference_id": "USN-3620-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3620-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3690-1/",
                    "reference_id": "USN-3690-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3690-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3777-3/",
                    "reference_id": "USN-3777-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3777-3/"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-002",
                    "reference_id": "vde-2018-002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
                },
                {
                    "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-003",
                    "reference_id": "vde-2018-003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
                    "reference_id": "VMSA-2018-0002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
                },
                {
                    "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
                    "reference_id": "VMSA-2018-0004.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
                },
                {
                    "reference_url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
                    "reference_id": "VMSA-2018-0007.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"
                        }
                    ],
                    "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html",
                    "reference_id": "XSA-254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-254.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2017-5715"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39937?format=api",
            "vulnerability_id": "VCID-x9yp-dmxp-fkfg",
            "summary": "Multiple vulnerabilities have been found in VirtualBox, the worst\n    of which could allow an attacker to take control of VirtualBox.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2689",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39267",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39382",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39353",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39389",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39358",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39387",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39348",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39329",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2689"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102693",
                    "reference_id": "102693",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:26Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102693"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040202",
                    "reference_id": "1040202",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:20:26Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040202"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201802-01",
                    "reference_id": "GLSA-201802-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201802-01"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942213?format=api",
                    "purl": "pkg:deb/debian/virtualbox@5.2.6-dfsg-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/942186?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-3.2%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059665?format=api",
                    "purl": "pkg:deb/debian/virtualbox@7.2.6-dfsg-4?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@7.2.6-dfsg-4%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2018-2689"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9yp-dmxp-fkfg"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/virtualbox@5.2.6-dfsg-1%3Fdistro=sid"
}