Lookup for vulnerable packages by Package URL.

GET /api/packages/1066848?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "spice",
    "version": "0.16.0-2",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80865?format=api",
            "vulnerability_id": "VCID-15db-nrnx-wbcw",
            "summary": "spice: multiple buffer overflow vulnerabilities in QUIC decoding code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14355.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14355.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78087",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7828",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78223",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78237",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78263",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78096",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78126",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78165",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78147",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78177",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78176",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78171",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78203",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78209",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14355"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868435",
                    "reference_id": "1868435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868435"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971750",
                    "reference_id": "971750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971750"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971751",
                    "reference_id": "971751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=971751"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-12",
                    "reference_id": "ASA-202107-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1239",
                    "reference_id": "AVG-1239",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1239"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2134",
                    "reference_id": "AVG-2134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4184",
                    "reference_id": "RHSA-2020:4184",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4184"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4185",
                    "reference_id": "RHSA-2020:4185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4186",
                    "reference_id": "RHSA-2020:4186",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4186"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4187",
                    "reference_id": "RHSA-2020:4187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4187"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4572-1/",
                    "reference_id": "USN-4572-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4572-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4572-2/",
                    "reference_id": "USN-4572-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4572-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939782?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-14355"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-15db-nrnx-wbcw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39983?format=api",
            "vulnerability_id": "VCID-7rdm-m2fr-qbb6",
            "summary": "Multiple vulnerabilities have been found in Spice Server, the worst of which may result in the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20201.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20201.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72609",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72796",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72742",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72771",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72617",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72634",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72612",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7265",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72662",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72685",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72668",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72658",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.727",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72712",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72704",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72745",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72754",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7275",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20201"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921846",
                    "reference_id": "1921846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921846"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983698",
                    "reference_id": "983698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983698"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202107-12",
                    "reference_id": "ASA-202107-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202107-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1239",
                    "reference_id": "AVG-1239",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1239"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-10",
                    "reference_id": "GLSA-202208-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202208-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1924",
                    "reference_id": "RHSA-2021:1924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1924"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-20201"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7rdm-m2fr-qbb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61910?format=api",
            "vulnerability_id": "VCID-8hpc-axe9-p7am",
            "summary": "A buffer overread has been discovered in spice possibly allowing\n    remote execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3813.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3813.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4733",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47338",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47391",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47339",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47255",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47319",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47366",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47387",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47335",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4739",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47389",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47413",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47394",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47445",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47396",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00241",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47382",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-3813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00026.html"
                },
                {
                    "reference_url": "https://www.debian.org/security/2019/dsa-4375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2019/dsa-4375"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/106801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/106801"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665371",
                    "reference_id": "1665371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665371"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920762",
                    "reference_id": "920762",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920762"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201902-4",
                    "reference_id": "ASA-201902-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201902-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-866",
                    "reference_id": "AVG-866",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-866"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3813",
                    "reference_id": "CVE-2019-3813",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3813"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202007-30",
                    "reference_id": "GLSA-202007-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202007-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0231",
                    "reference_id": "RHSA-2019:0231",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0231"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0232",
                    "reference_id": "RHSA-2019:0232",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0232"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0457",
                    "reference_id": "RHSA-2019:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0457"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3870-1/",
                    "reference_id": "USN-3870-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3870-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939781?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-3813"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hpc-axe9-p7am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41294?format=api",
            "vulnerability_id": "VCID-9uj2-9xph-y3hm",
            "summary": "Multiple vulnerabilities have been found in spice, the worst of\n    which may result in the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0749.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0749.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94809",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94784",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94792",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.948",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94731",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94744",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94759",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94762",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94766",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94767",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94775",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94778",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9478",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94781",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.15975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94782",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0749"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:S/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3596"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3014-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-3014-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300646",
                    "reference_id": "1300646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300646"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826585",
                    "reference_id": "826585",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826585"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0749",
                    "reference_id": "CVE-2016-0749",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0749"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-05",
                    "reference_id": "GLSA-201606-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201606-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1204",
                    "reference_id": "RHSA-2016:1204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1205",
                    "reference_id": "RHSA-2016:1205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1205"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3014-1/",
                    "reference_id": "USN-3014-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3014-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939777?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.6-4.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.6-4.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-0749"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9uj2-9xph-y3hm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87693?format=api",
            "vulnerability_id": "VCID-a47a-xzem-7yg1",
            "summary": "libspice: Insufficient guest provided pointers validation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0428.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0428.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0428",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15956",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16035",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16096",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16037",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16014",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15908",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15833",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15846",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1589",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15906",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15901",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15867",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15743",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15855",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0428"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0622.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0622.html"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0633.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0633.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=568699",
                    "reference_id": "568699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=568699"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0428",
                    "reference_id": "CVE-2010-0428",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0622",
                    "reference_id": "RHSA-2010:0622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0622"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0633",
                    "reference_id": "RHSA-2010:0633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0633"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939769?format=api",
                    "purl": "pkg:deb/debian/spice@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0428"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a47a-xzem-7yg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73390?format=api",
            "vulnerability_id": "VCID-btxr-2zwf-hfdc",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10873.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10873.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78911",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78917",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78946",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78929",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78954",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7896",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78984",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78968",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78958",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78987",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78983",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79013",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7902",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79035",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7905",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79072",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79088",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10873"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596008",
                    "reference_id": "1596008",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1596008"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906315",
                    "reference_id": "906315",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906315"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906316",
                    "reference_id": "906316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906316"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2731",
                    "reference_id": "RHSA-2018:2731",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2731"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2732",
                    "reference_id": "RHSA-2018:2732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2732"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3470",
                    "reference_id": "RHSA-2018:3470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3470"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3751-1/",
                    "reference_id": "USN-3751-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3751-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939780?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.0-1.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.0-1.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-10873"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-btxr-2zwf-hfdc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82701?format=api",
            "vulnerability_id": "VCID-c2qd-zga1-vycn",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9577.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9577.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8785",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87983",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87952",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87967",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8786",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87873",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87876",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87905",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87916",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87909",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87907",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87921",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8792",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87937",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87943",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03672",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87941",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9577"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401603",
                    "reference_id": "1401603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401603"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854336",
                    "reference_id": "854336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0253",
                    "reference_id": "RHSA-2017:0253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0254",
                    "reference_id": "RHSA-2017:0254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0549",
                    "reference_id": "RHSA-2017:0549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0552",
                    "reference_id": "RHSA-2017:0552",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0552"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3202-1/",
                    "reference_id": "USN-3202-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3202-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939778?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.8-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.8-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9577"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c2qd-zga1-vycn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41293?format=api",
            "vulnerability_id": "VCID-cqg7-9pas-5ffk",
            "summary": "Multiple vulnerabilities have been found in spice, the worst of\n    which may result in the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1889.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1889.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1890.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5261.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5261.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25772",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25754",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25645",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25711",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25999",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26083",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26123",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25958",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2601",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2602",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25975",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25917",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25921",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25902",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25873",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25808",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25801",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:P"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3371"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/06/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2015/10/06/4"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033753"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2766-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2766-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261889",
                    "reference_id": "1261889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261889"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801091",
                    "reference_id": "801091",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801091"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5261",
                    "reference_id": "CVE-2015-5261",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5261"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-05",
                    "reference_id": "GLSA-201606-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201606-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1889",
                    "reference_id": "RHSA-2015:1889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1890",
                    "reference_id": "RHSA-2015:1890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1890"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2766-1/",
                    "reference_id": "USN-2766-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2766-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939776?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.5-1.3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.5-1.3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-5261"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cqg7-9pas-5ffk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78145?format=api",
            "vulnerability_id": "VCID-ffvg-6mve-zuee",
            "summary": "spice: Improper input validation in function async_READ_handler",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-23793.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-23793.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-23793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25476",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25542",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25264",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2514",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25204",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25579",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25352",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2542",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25467",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25479",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25437",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25383",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2539",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2538",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2535",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25313",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25305",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0009",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25259",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-23793"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23793",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23793"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234984",
                    "reference_id": "2234984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234984"
                },
                {
                    "reference_url": "https://github.com/zelat/spice-security-issues",
                    "reference_id": "spice-security-issues",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:56:53Z/"
                        }
                    ],
                    "url": "https://github.com/zelat/spice-security-issues"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939783?format=api",
                    "purl": "pkg:deb/debian/spice@0.13.90-0.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.13.90-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-23793"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffvg-6mve-zuee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87830?format=api",
            "vulnerability_id": "VCID-j6xg-q2cs-bbfa",
            "summary": "libspice: Insufficient guest provided memory mappings boundaries validations",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0430.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0430.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45903",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45924",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45872",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45928",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45925",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45948",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45919",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45926",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45978",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45973",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45869",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45879",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45822",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4572",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45783",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00231",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45802",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0430"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=568702",
                    "reference_id": "568702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=568702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0271",
                    "reference_id": "RHSA-2010:0271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0271"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0476",
                    "reference_id": "RHSA-2010:0476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0476"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939769?format=api",
                    "purl": "pkg:deb/debian/spice@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0430"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j6xg-q2cs-bbfa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55562?format=api",
            "vulnerability_id": "VCID-jqee-tzwm-yqay",
            "summary": "denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4282.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4282.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78331",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78314",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8116",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81159",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81187",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81193",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81213",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81199",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81128",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81229",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81231",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81252",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81259",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8128",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81191",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01509",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81136",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4282"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000443",
                    "reference_id": "1000443",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1000443"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728314",
                    "reference_id": "728314",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728314"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1460",
                    "reference_id": "RHSA-2013:1460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1473",
                    "reference_id": "RHSA-2013:1473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1473"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1474",
                    "reference_id": "RHSA-2013:1474",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1474"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2027-1/",
                    "reference_id": "USN-2027-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2027-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939774?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.4-0nocelt2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.4-0nocelt2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-4282"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqee-tzwm-yqay"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41295?format=api",
            "vulnerability_id": "VCID-md4t-zmhj-cbhf",
            "summary": "Multiple vulnerabilities have been found in spice, the worst of\n    which may result in the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00004.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2150.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2150.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21928",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2187",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21778",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21851",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22201",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22249",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22112",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22167",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22187",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22146",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22087",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2208",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22035",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21893",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21882",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2150"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3596",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3596"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3014-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-3014-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313496",
                    "reference_id": "1313496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1313496"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826584",
                    "reference_id": "826584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=826584"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:scientific_computing:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:scientific_computing:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2150",
                    "reference_id": "CVE-2016-2150",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2150"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-05",
                    "reference_id": "GLSA-201606-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201606-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1204",
                    "reference_id": "RHSA-2016:1204",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1204"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1205",
                    "reference_id": "RHSA-2016:1205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1205"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3014-1/",
                    "reference_id": "USN-3014-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3014-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939777?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.6-4.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.6-4.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-2150"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.4",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-md4t-zmhj-cbhf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72535?format=api",
            "vulnerability_id": "VCID-qep8-yync-3kch",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7506.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7506.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.749",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7495",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74901",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7493",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74903",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74937",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00855",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74972",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75504",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75557",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75488",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75493",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75532",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75412",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75453",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75459",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75448",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00884",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75484",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7506"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:C"
                        },
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452606",
                    "reference_id": "1452606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452606"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868083",
                    "reference_id": "868083",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868083"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201708-12",
                    "reference_id": "ASA-201708-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201708-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-349",
                    "reference_id": "AVG-349",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-349"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2471",
                    "reference_id": "RHSA-2017:2471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2471"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3522",
                    "reference_id": "RHSA-2018:3522",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3522"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3355-1/",
                    "reference_id": "USN-3355-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3355-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939779?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.8-2.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.8-2.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-7506"
            ],
            "risk_score": 4.1,
            "exploitability": "0.5",
            "weighted_severity": "8.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qep8-yync-3kch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82702?format=api",
            "vulnerability_id": "VCID-vbf4-zj87-rkck",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9578.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9578.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8724",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8738",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87349",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87361",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8725",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87266",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87263",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87282",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8729",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87297",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87293",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87308",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87312",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87306",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87323",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87329",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03335",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87331",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9578"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399566",
                    "reference_id": "1399566",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1399566"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854336",
                    "reference_id": "854336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0253",
                    "reference_id": "RHSA-2017:0253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0254",
                    "reference_id": "RHSA-2017:0254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0549",
                    "reference_id": "RHSA-2017:0549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0552",
                    "reference_id": "RHSA-2017:0552",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0552"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3202-1/",
                    "reference_id": "USN-3202-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3202-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939778?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.8-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.8-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-9578"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbf4-zj87-rkck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41291?format=api",
            "vulnerability_id": "VCID-w9nw-q8yp-qugm",
            "summary": "Multiple vulnerabilities have been found in spice, the worst of\n    which may result in the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.freedesktop.org/archives/spice-devel/2015-October/022191.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1889.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1889.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1890.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1890.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5260.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5260.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47367",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47431",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47387",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47303",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47414",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47435",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47385",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47439",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47436",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47459",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47434",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4744",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.475",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47492",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47444",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2015/dsa-3371"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/77019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/77019"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1033753",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1033753"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2766-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2766-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260822",
                    "reference_id": "1260822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1260822"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801089",
                    "reference_id": "801089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=801089"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:spice_project:spice:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5260",
                    "reference_id": "CVE-2015-5260",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5260"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-05",
                    "reference_id": "GLSA-201606-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201606-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1889",
                    "reference_id": "RHSA-2015:1889",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1889"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1890",
                    "reference_id": "RHSA-2015:1890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1890"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2766-1/",
                    "reference_id": "USN-2766-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2766-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939776?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.5-1.3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.5-1.3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-5260"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9nw-q8yp-qugm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80728?format=api",
            "vulnerability_id": "VCID-we7z-vyz3-3udn",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3247.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3247.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73671",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73491",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.735",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73494",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7353",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73544",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73567",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7355",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73542",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73586",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73596",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73588",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73621",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73631",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7363",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73623",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00771",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73648",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233238",
                    "reference_id": "1233238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233238"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797976",
                    "reference_id": "797976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797976"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1713",
                    "reference_id": "RHSA-2015:1713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1713"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1714",
                    "reference_id": "RHSA-2015:1714",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1714"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1715",
                    "reference_id": "RHSA-2015:1715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1715"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2736-1/",
                    "reference_id": "USN-2736-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2736-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939775?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.5-1.2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.5-1.2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-3247"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-we7z-vyz3-3udn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55561?format=api",
            "vulnerability_id": "VCID-ybnj-b9b4-cuhr",
            "summary": "denial of service",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4130.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4130.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78007",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78014",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78026",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78052",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78057",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78083",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78066",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78062",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78097",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78096",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7809",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78123",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78129",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78143",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78154",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78181",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78197",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4130",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4130"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717030",
                    "reference_id": "717030",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717030"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=984769",
                    "reference_id": "984769",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984769"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1192",
                    "reference_id": "RHSA-2013:1192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1260",
                    "reference_id": "RHSA-2013:1260",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1260"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1926-1/",
                    "reference_id": "USN-1926-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1926-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939773?format=api",
                    "purl": "pkg:deb/debian/spice@0.12.4-0nocelt1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.12.4-0nocelt1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-4130"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybnj-b9b4-cuhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87694?format=api",
            "vulnerability_id": "VCID-z8bc-51qw-tues",
            "summary": "libspice: Relying on guest provided data structures to indicate memory allocation",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0429.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0429.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15956",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15965",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16035",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16096",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15889",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15974",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16037",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16014",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15908",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15833",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15846",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1589",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15906",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15901",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15867",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15743",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15855",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0429"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0622.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0622.html"
                },
                {
                    "reference_url": "https://rhn.redhat.com/errata/RHSA-2010-0633.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://rhn.redhat.com/errata/RHSA-2010-0633.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=568701",
                    "reference_id": "568701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=568701"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:qspice:0.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0429",
                    "reference_id": "CVE-2010-0429",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0429"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0622",
                    "reference_id": "RHSA-2010:0622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0622"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0633",
                    "reference_id": "RHSA-2010:0633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0633"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939769?format=api",
                    "purl": "pkg:deb/debian/spice@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939770?format=api",
                    "purl": "pkg:deb/debian/spice@0.14.3-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.14.3-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939768?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939772?format=api",
                    "purl": "pkg:deb/debian/spice@0.15.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.15.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/939771?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1066848?format=api",
                    "purl": "pkg:deb/debian/spice@0.16.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2010-0429"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z8bc-51qw-tues"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/spice@0.16.0-2%3Fdistro=trixie"
}