Lookup for vulnerable packages by Package URL.

GET /api/packages/1038032?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1038032?format=api",
    "purl": "pkg:deb/debian/spice@0.14.0-1.3%2Bdeb10u1",
    "type": "deb",
    "namespace": "debian",
    "name": "spice",
    "version": "0.14.0-1.3+deb10u1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "0.14.3-2.1",
    "latest_non_vulnerable_version": "0.14.3-2.1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80865?format=api",
            "vulnerability_id": "VCID-15db-nrnx-wbcw",
            "summary": "spice: multiple buffer overflow vulnerabilities in QUIC decoding code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14355.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14355.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78331",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7828",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78292",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78096",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78126",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78176",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78171",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78203",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78223",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78237",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78263",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868435",
                    "reference_id": "1868435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868435"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971750",
                    "reference_id": "971750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971750"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971751",
                    "reference_id": "971751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971751"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-12",
                    "reference_id": "ASA-202107-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1239",
                    "reference_id": "AVG-1239",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1239"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2134",
                    "reference_id": "AVG-2134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4184",
                    "reference_id": "RHSA-2020:4184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4184"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4185",
                    "reference_id": "RHSA-2020:4185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4186",
                    "reference_id": "RHSA-2020:4186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4187",
                    "reference_id": "RHSA-2020:4187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4187"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4572-1/",
                    "reference_id": "USN-4572-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4572-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4572-2/",
                    "reference_id": "USN-4572-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4572-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1053471?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1"
                }
            ],
            "aliases": [
                "CVE-2020-14355"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-15db-nrnx-wbcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39983?format=api",
            "vulnerability_id": "VCID-7rdm-m2fr-qbb6",
            "summary": "Multiple vulnerabilities have been found in Spice Server, the worst of which may result in the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20201.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20201.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72609",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72839",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7276",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72785",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72617",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72612",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7265",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72685",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72668",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72658",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.727",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72712",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72745",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7275",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72742",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72771",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72796",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921846",
                    "reference_id": "1921846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921846"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983698",
                    "reference_id": "983698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983698"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-12",
                    "reference_id": "ASA-202107-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1239",
                    "reference_id": "AVG-1239",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1239"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-10",
                    "reference_id": "GLSA-202208-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1924",
                    "reference_id": "RHSA-2021:1924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1924"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1053471?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1"
                }
            ],
            "aliases": [
                "CVE-2021-20201"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rdm-m2fr-qbb6"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80865?format=api",
            "vulnerability_id": "VCID-15db-nrnx-wbcw",
            "summary": "spice: multiple buffer overflow vulnerabilities in QUIC decoding code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14355.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14355.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78331",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7828",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78292",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78096",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78126",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78176",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78171",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78203",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78209",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78223",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78237",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78263",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868435",
                    "reference_id": "1868435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868435"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971750",
                    "reference_id": "971750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971750"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971751",
                    "reference_id": "971751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971751"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-12",
                    "reference_id": "ASA-202107-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1239",
                    "reference_id": "AVG-1239",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1239"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2134",
                    "reference_id": "AVG-2134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4184",
                    "reference_id": "RHSA-2020:4184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4184"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4185",
                    "reference_id": "RHSA-2020:4185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4186",
                    "reference_id": "RHSA-2020:4186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4187",
                    "reference_id": "RHSA-2020:4187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4187"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4572-1/",
                    "reference_id": "USN-4572-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4572-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4572-2/",
                    "reference_id": "USN-4572-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4572-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038032?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.3%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%252Bdeb10u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1053471?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1"
                }
            ],
            "aliases": [
                "CVE-2020-14355"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-15db-nrnx-wbcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61910?format=api",
            "vulnerability_id": "VCID-8hpc-axe9-p7am",
            "summary": "A buffer overread has been discovered in spice possibly allowing\n    remote execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3813.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3813.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47383",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47319",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47338",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47282",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47313",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47335",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4739",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47389",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47413",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47394",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47445",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47396",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47382",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47391",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47339",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47255",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2019/dsa-4375"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106801"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665371",
                    "reference_id": "1665371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665371"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920762",
                    "reference_id": "920762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920762"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-4",
                    "reference_id": "ASA-201902-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-866",
                    "reference_id": "AVG-866",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-866"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3813",
                    "reference_id": "CVE-2019-3813",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3813"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-30",
                    "reference_id": "GLSA-202007-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0231",
                    "reference_id": "RHSA-2019:0231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0232",
                    "reference_id": "RHSA-2019:0232",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0232"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0457",
                    "reference_id": "RHSA-2019:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0457"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3870-1/",
                    "reference_id": "USN-3870-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3870-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037158?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.8-2.1%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        },
                        {
                            "vulnerability": "VCID-8hpc-axe9-p7am"
                        },
                        {
                            "vulnerability": "VCID-btxr-2zwf-hfdc"
                        },
                        {
                            "vulnerability": "VCID-ffvg-6mve-zuee"
                        },
                        {
                            "vulnerability": "VCID-qep8-yync-3kch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.8-2.1%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038032?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.3%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%252Bdeb10u1"
                }
            ],
            "aliases": [
                "CVE-2019-3813"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hpc-axe9-p7am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73390?format=api",
            "vulnerability_id": "VCID-btxr-2zwf-hfdc",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10873.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10873.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78911",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78917",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78946",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78929",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78954",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7896",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78984",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78968",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78987",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78983",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79013",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7902",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79035",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7905",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79072",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79088",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79087",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79102",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79139",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10873"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596008",
                    "reference_id": "1596008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596008"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906315",
                    "reference_id": "906315",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906315"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906316",
                    "reference_id": "906316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2731",
                    "reference_id": "RHSA-2018:2731",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2731"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2732",
                    "reference_id": "RHSA-2018:2732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3470",
                    "reference_id": "RHSA-2018:3470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3470"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3751-1/",
                    "reference_id": "USN-3751-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3751-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037158?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.8-2.1%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        },
                        {
                            "vulnerability": "VCID-8hpc-axe9-p7am"
                        },
                        {
                            "vulnerability": "VCID-btxr-2zwf-hfdc"
                        },
                        {
                            "vulnerability": "VCID-ffvg-6mve-zuee"
                        },
                        {
                            "vulnerability": "VCID-qep8-yync-3kch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.8-2.1%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038032?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.3%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%252Bdeb10u1"
                }
            ],
            "aliases": [
                "CVE-2018-10873"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-btxr-2zwf-hfdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78145?format=api",
            "vulnerability_id": "VCID-ffvg-6mve-zuee",
            "summary": "spice: Improper input validation in function async_READ_handler",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-23793.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-23793.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-23793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25476",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25542",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25286",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2519",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25208",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25579",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25352",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2542",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25467",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25479",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25437",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2539",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2538",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2535",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25313",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25305",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25259",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2514",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25204",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25264",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-23793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23793"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234984",
                    "reference_id": "2234984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234984"
                },
                {
                    "reference_url": "https://github.com/zelat/spice-security-issues",
                    "reference_id": "spice-security-issues",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:56:53Z/"
                        }
                    ],
                    "url": "https://github.com/zelat/spice-security-issues"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038032?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.3%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%252Bdeb10u1"
                }
            ],
            "aliases": [
                "CVE-2020-23793"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffvg-6mve-zuee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72535?format=api",
            "vulnerability_id": "VCID-qep8-yync-3kch",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7506.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7506.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71294",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71211",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0066",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71238",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.749",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74901",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7493",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74903",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74937",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74972",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7495",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75412",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75459",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75448",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75484",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75488",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75493",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75504",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75532",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75557",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7506"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:C"
                        },
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452606",
                    "reference_id": "1452606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452606"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868083",
                    "reference_id": "868083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868083"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201708-12",
                    "reference_id": "ASA-201708-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201708-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-349",
                    "reference_id": "AVG-349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2471",
                    "reference_id": "RHSA-2017:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3522",
                    "reference_id": "RHSA-2018:3522",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3522"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3355-1/",
                    "reference_id": "USN-3355-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3355-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1035973?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.5-1%2Bdeb8u5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        },
                        {
                            "vulnerability": "VCID-8hpc-axe9-p7am"
                        },
                        {
                            "vulnerability": "VCID-9uj2-9xph-y3hm"
                        },
                        {
                            "vulnerability": "VCID-btxr-2zwf-hfdc"
                        },
                        {
                            "vulnerability": "VCID-c2qd-zga1-vycn"
                        },
                        {
                            "vulnerability": "VCID-cqg7-9pas-5ffk"
                        },
                        {
                            "vulnerability": "VCID-ffvg-6mve-zuee"
                        },
                        {
                            "vulnerability": "VCID-md4t-zmhj-cbhf"
                        },
                        {
                            "vulnerability": "VCID-qep8-yync-3kch"
                        },
                        {
                            "vulnerability": "VCID-vbf4-zj87-rkck"
                        },
                        {
                            "vulnerability": "VCID-w9nw-q8yp-qugm"
                        },
                        {
                            "vulnerability": "VCID-we7z-vyz3-3udn"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.5-1%252Bdeb8u5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037158?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.8-2.1%2Bdeb9u3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        },
                        {
                            "vulnerability": "VCID-8hpc-axe9-p7am"
                        },
                        {
                            "vulnerability": "VCID-btxr-2zwf-hfdc"
                        },
                        {
                            "vulnerability": "VCID-ffvg-6mve-zuee"
                        },
                        {
                            "vulnerability": "VCID-qep8-yync-3kch"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.8-2.1%252Bdeb9u3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038032?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.3%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-15db-nrnx-wbcw"
                        },
                        {
                            "vulnerability": "VCID-7rdm-m2fr-qbb6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%252Bdeb10u1"
                }
            ],
            "aliases": [
                "CVE-2017-7506"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qep8-yync-3kch"
        }
    ],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%252Bdeb10u1"
}