Lookup for vulnerable packages by Package URL.

GET /api/packages/925516?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/925516?format=api",
    "purl": "pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "intel-microcode",
    "version": "3.20180703.1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.20190514.1",
    "latest_non_vulnerable_version": "3.20260227.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=api",
            "vulnerability_id": "VCID-6jsn-7538-a7ha",
            "summary": "L1 Terminal Fault speculative side channel",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88182",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88357",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88279",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8829",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88307",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88319",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88317",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8833",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88212",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88231",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88237",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88242",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88241",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88255",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88254",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03877",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88276",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88411",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88427",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005",
                    "reference_id": "1585005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-756",
                    "reference_id": "AVG-756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-756"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-757",
                    "reference_id": "AVG-757",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-757"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-758",
                    "reference_id": "AVG-758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-758"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384",
                    "reference_id": "RHSA-2018:2384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387",
                    "reference_id": "RHSA-2018:2387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388",
                    "reference_id": "RHSA-2018:2388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2388"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389",
                    "reference_id": "RHSA-2018:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390",
                    "reference_id": "RHSA-2018:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391",
                    "reference_id": "RHSA-2018:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392",
                    "reference_id": "RHSA-2018:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393",
                    "reference_id": "RHSA-2018:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394",
                    "reference_id": "RHSA-2018:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395",
                    "reference_id": "RHSA-2018:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396",
                    "reference_id": "RHSA-2018:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402",
                    "reference_id": "RHSA-2018:2402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403",
                    "reference_id": "RHSA-2018:2403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404",
                    "reference_id": "RHSA-2018:2404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602",
                    "reference_id": "RHSA-2018:2602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2602"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603",
                    "reference_id": "RHSA-2018:2603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2603"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-1/",
                    "reference_id": "USN-3740-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-2/",
                    "reference_id": "USN-3740-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-1/",
                    "reference_id": "USN-3741-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-2/",
                    "reference_id": "USN-3741-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-1/",
                    "reference_id": "USN-3742-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-2/",
                    "reference_id": "USN-3742-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3756-1/",
                    "reference_id": "USN-3756-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3756-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3823-1/",
                    "reference_id": "USN-3823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3823-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html",
                    "reference_id": "XSA-273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-273.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925516?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-3646",
                "XSA-273"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4149?format=api",
            "vulnerability_id": "VCID-75hg-p8uc-p7ex",
            "summary": "Speculative Store Bypass",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3639.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.39422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97282",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.39422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97272",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.39422",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97277",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97629",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97631",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97632",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97639",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97642",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97641",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97647",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97652",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97654",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97655",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97657",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97662",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9767",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97619",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97624",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.46015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97627",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3639"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890",
                    "reference_id": "1566890",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
                    "reference_id": "CVE-2018-3639",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c",
                    "reference_id": "CVE-2018-3639",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/dos/44695.c"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1629",
                    "reference_id": "RHSA-2018:1629",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1629"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1630",
                    "reference_id": "RHSA-2018:1630",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1630"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1632",
                    "reference_id": "RHSA-2018:1632",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1632"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1633",
                    "reference_id": "RHSA-2018:1633",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1633"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1635",
                    "reference_id": "RHSA-2018:1635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1636",
                    "reference_id": "RHSA-2018:1636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1636"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1637",
                    "reference_id": "RHSA-2018:1637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1637"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1638",
                    "reference_id": "RHSA-2018:1638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1638"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1639",
                    "reference_id": "RHSA-2018:1639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1639"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1640",
                    "reference_id": "RHSA-2018:1640",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1640"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1641",
                    "reference_id": "RHSA-2018:1641",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1641"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1642",
                    "reference_id": "RHSA-2018:1642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1642"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1643",
                    "reference_id": "RHSA-2018:1643",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1643"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1644",
                    "reference_id": "RHSA-2018:1644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1644"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1645",
                    "reference_id": "RHSA-2018:1645",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1645"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1646",
                    "reference_id": "RHSA-2018:1646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1646"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1647",
                    "reference_id": "RHSA-2018:1647",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1647"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1648",
                    "reference_id": "RHSA-2018:1648",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1648"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1649",
                    "reference_id": "RHSA-2018:1649",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1649"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1650",
                    "reference_id": "RHSA-2018:1650",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1650"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1651",
                    "reference_id": "RHSA-2018:1651",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1651"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1652",
                    "reference_id": "RHSA-2018:1652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1652"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1653",
                    "reference_id": "RHSA-2018:1653",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1653"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1654",
                    "reference_id": "RHSA-2018:1654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1654"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1655",
                    "reference_id": "RHSA-2018:1655",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1655"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1656",
                    "reference_id": "RHSA-2018:1656",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1656"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1657",
                    "reference_id": "RHSA-2018:1657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1657"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1658",
                    "reference_id": "RHSA-2018:1658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1658"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1659",
                    "reference_id": "RHSA-2018:1659",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1659"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1660",
                    "reference_id": "RHSA-2018:1660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1660"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1661",
                    "reference_id": "RHSA-2018:1661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1662",
                    "reference_id": "RHSA-2018:1662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1662"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1663",
                    "reference_id": "RHSA-2018:1663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1663"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1664",
                    "reference_id": "RHSA-2018:1664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1665",
                    "reference_id": "RHSA-2018:1665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1666",
                    "reference_id": "RHSA-2018:1666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1666"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1667",
                    "reference_id": "RHSA-2018:1667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1668",
                    "reference_id": "RHSA-2018:1668",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1668"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1669",
                    "reference_id": "RHSA-2018:1669",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1674",
                    "reference_id": "RHSA-2018:1674",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1674"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1675",
                    "reference_id": "RHSA-2018:1675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1676",
                    "reference_id": "RHSA-2018:1676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1686",
                    "reference_id": "RHSA-2018:1686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1686"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1688",
                    "reference_id": "RHSA-2018:1688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1688"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1689",
                    "reference_id": "RHSA-2018:1689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1689"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1690",
                    "reference_id": "RHSA-2018:1690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1690"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1696",
                    "reference_id": "RHSA-2018:1696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1696"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1710",
                    "reference_id": "RHSA-2018:1710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1711",
                    "reference_id": "RHSA-2018:1711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1711"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1737",
                    "reference_id": "RHSA-2018:1737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1737"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1738",
                    "reference_id": "RHSA-2018:1738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1738"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1826",
                    "reference_id": "RHSA-2018:1826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1854",
                    "reference_id": "RHSA-2018:1854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1854"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1965",
                    "reference_id": "RHSA-2018:1965",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1965"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967",
                    "reference_id": "RHSA-2018:1967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1967"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1997",
                    "reference_id": "RHSA-2018:1997",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1997"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2001",
                    "reference_id": "RHSA-2018:2001",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2001"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2003",
                    "reference_id": "RHSA-2018:2003",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2003"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2006",
                    "reference_id": "RHSA-2018:2006",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2006"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2060",
                    "reference_id": "RHSA-2018:2060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2060"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2161",
                    "reference_id": "RHSA-2018:2161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2161"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2162",
                    "reference_id": "RHSA-2018:2162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2162"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2164",
                    "reference_id": "RHSA-2018:2164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2171",
                    "reference_id": "RHSA-2018:2171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2172",
                    "reference_id": "RHSA-2018:2172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2172"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2216",
                    "reference_id": "RHSA-2018:2216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2228",
                    "reference_id": "RHSA-2018:2228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2228"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2246",
                    "reference_id": "RHSA-2018:2246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2250",
                    "reference_id": "RHSA-2018:2250",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2250"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2258",
                    "reference_id": "RHSA-2018:2258",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2258"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2289",
                    "reference_id": "RHSA-2018:2289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2309",
                    "reference_id": "RHSA-2018:2309",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2309"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2328",
                    "reference_id": "RHSA-2018:2328",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2328"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2363",
                    "reference_id": "RHSA-2018:2363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2363"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2364",
                    "reference_id": "RHSA-2018:2364",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2364"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387",
                    "reference_id": "RHSA-2018:2387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394",
                    "reference_id": "RHSA-2018:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396",
                    "reference_id": "RHSA-2018:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2948",
                    "reference_id": "RHSA-2018:2948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2948"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3396",
                    "reference_id": "RHSA-2018:3396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3397",
                    "reference_id": "RHSA-2018:3397",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3397"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3398",
                    "reference_id": "RHSA-2018:3398",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3398"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3399",
                    "reference_id": "RHSA-2018:3399",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3399"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3400",
                    "reference_id": "RHSA-2018:3400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3400"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3401",
                    "reference_id": "RHSA-2018:3401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3402",
                    "reference_id": "RHSA-2018:3402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3407",
                    "reference_id": "RHSA-2018:3407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3407"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3423",
                    "reference_id": "RHSA-2018:3423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3423"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3424",
                    "reference_id": "RHSA-2018:3424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3425",
                    "reference_id": "RHSA-2018:3425",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3425"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:0148",
                    "reference_id": "RHSA-2019:0148",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:0148"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1046",
                    "reference_id": "RHSA-2019:1046",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1046"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3651-1/",
                    "reference_id": "USN-3651-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3651-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3652-1/",
                    "reference_id": "USN-3652-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3652-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3653-1/",
                    "reference_id": "USN-3653-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3653-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3653-2/",
                    "reference_id": "USN-3653-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3653-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3654-1/",
                    "reference_id": "USN-3654-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3654-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3654-2/",
                    "reference_id": "USN-3654-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3654-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3655-1/",
                    "reference_id": "USN-3655-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3655-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3655-2/",
                    "reference_id": "USN-3655-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3655-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3679-1/",
                    "reference_id": "USN-3679-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3679-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3680-1/",
                    "reference_id": "USN-3680-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3680-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3756-1/",
                    "reference_id": "USN-3756-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3756-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3777-3/",
                    "reference_id": "USN-3777-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3777-3/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-263.html",
                    "reference_id": "XSA-263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-263.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925516?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-3639",
                "XSA-263"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "5.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75hg-p8uc-p7ex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77202?format=api",
            "vulnerability_id": "VCID-7gm7-fjkv-z3e9",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3640.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3640.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75631",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75633",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75664",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75644",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75678",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75689",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75713",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75694",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75688",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75726",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00902",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75729",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80064",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80343",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80365",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80382",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80328",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81634",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8151",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81518",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81577",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81595",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3640"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580340",
                    "reference_id": "1580340",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1580340"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3756-1/",
                    "reference_id": "USN-3756-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3756-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925516?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-3640"
            ],
            "risk_score": 1.2,
            "exploitability": "0.5",
            "weighted_severity": "2.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gm7-fjkv-z3e9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4159?format=api",
            "vulnerability_id": "VCID-7vn6-5h93-27hn",
            "summary": "L1 Terminal Fault speculative side channel",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84774",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84661",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8467",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84673",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84713",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8473",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84726",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.02259",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84743",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84817",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86679",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86677",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8667",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86689",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86607",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86665",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86637",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03037",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86656",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005",
                    "reference_id": "1585005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-756",
                    "reference_id": "AVG-756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-756"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-757",
                    "reference_id": "AVG-757",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-757"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-758",
                    "reference_id": "AVG-758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-758"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201810-06",
                    "reference_id": "GLSA-201810-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201810-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384",
                    "reference_id": "RHSA-2018:2384",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2384"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387",
                    "reference_id": "RHSA-2018:2387",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2387"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388",
                    "reference_id": "RHSA-2018:2388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2388"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389",
                    "reference_id": "RHSA-2018:2389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390",
                    "reference_id": "RHSA-2018:2390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2390"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391",
                    "reference_id": "RHSA-2018:2391",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2391"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392",
                    "reference_id": "RHSA-2018:2392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2392"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393",
                    "reference_id": "RHSA-2018:2393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2393"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394",
                    "reference_id": "RHSA-2018:2394",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2394"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395",
                    "reference_id": "RHSA-2018:2395",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2395"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396",
                    "reference_id": "RHSA-2018:2396",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2396"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402",
                    "reference_id": "RHSA-2018:2402",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2402"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403",
                    "reference_id": "RHSA-2018:2403",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2403"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404",
                    "reference_id": "RHSA-2018:2404",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2404"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602",
                    "reference_id": "RHSA-2018:2602",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2602"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603",
                    "reference_id": "RHSA-2018:2603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2603"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-1/",
                    "reference_id": "USN-3740-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3740-2/",
                    "reference_id": "USN-3740-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3740-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-1/",
                    "reference_id": "USN-3741-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3741-2/",
                    "reference_id": "USN-3741-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3741-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-1/",
                    "reference_id": "USN-3742-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3742-2/",
                    "reference_id": "USN-3742-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3742-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3823-1/",
                    "reference_id": "USN-3823-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3823-1/"
                },
                {
                    "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html",
                    "reference_id": "XSA-273",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://xenbits.xen.org/xsa/advisory-273.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925516?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-3620"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90664?format=api",
            "vulnerability_id": "VCID-yzkk-a8az-hff5",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8023",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80216",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80239",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80211",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8024",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80186",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80174",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8021",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81329",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81338",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82491",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82547",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82507",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.01714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82395",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82418",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82428",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82688",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82706",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82727",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82748",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3615"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-756",
                    "reference_id": "AVG-756",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-756"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-757",
                    "reference_id": "AVG-757",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-757"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-758",
                    "reference_id": "AVG-758",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-758"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925516?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20180703.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925512?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20240813.1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925510?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925514?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-38q7-4ar3-sqcc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20251111.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/925513?format=api",
                    "purl": "pkg:deb/debian/intel-microcode@3.20260227.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20260227.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2018-3615"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yzkk-a8az-hff5"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/intel-microcode@3.20180703.1%3Fdistro=trixie"
}