Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
Typeapk
Namespacealpine
Namexen
Version4.11.1-r0
Qualifiers
arch s390x
distroversion v3.12
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.12.0-r2
Latest_non_vulnerable_version4.13.4-r3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1phh-s2rg-4ugh
vulnerability_id VCID-1phh-s2rg-4ugh
summary resource accounting issues in x86 IOREQ server handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19963.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19963.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19963
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15892
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15955
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16019
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15819
published_at 2026-04-21T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-08T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15966
published_at 2026-04-09T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15945
published_at 2026-04-11T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15907
published_at 2026-04-12T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15839
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15762
published_at 2026-04-16T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15773
published_at 2026-04-18T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15835
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19963
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19963
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1652231
reference_id 1652231
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1652231
5
reference_url https://xenbits.xen.org/xsa/advisory-276.html
reference_id XSA-276
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-276.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-19963, XSA-276
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1phh-s2rg-4ugh
1
url VCID-64mf-wa98-rkha
vulnerability_id VCID-64mf-wa98-rkha
summary x86: incorrect error handling for guest p2m page removals
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19964.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19964
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31599
published_at 2026-04-01T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31732
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31776
published_at 2026-04-04T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31595
published_at 2026-04-07T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31648
published_at 2026-04-08T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31677
published_at 2026-04-09T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31682
published_at 2026-04-11T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31642
published_at 2026-04-12T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31605
published_at 2026-04-13T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31639
published_at 2026-04-16T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31616
published_at 2026-04-18T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31585
published_at 2026-04-21T12:55:00Z
12
value 0.00124
scoring_system epss
scoring_elements 0.31407
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19964
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19964
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1652227
reference_id 1652227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1652227
5
reference_url https://xenbits.xen.org/xsa/advisory-277.html
reference_id XSA-277
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-277.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-19964, XSA-277
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64mf-wa98-rkha
2
url VCID-6b1e-39na-b7gf
vulnerability_id VCID-6b1e-39na-b7gf
summary guest use of HLE constructs may lock up host
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19967.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19967
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21875
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22037
published_at 2026-04-02T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22089
published_at 2026-04-04T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21854
published_at 2026-04-07T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21929
published_at 2026-04-08T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-09T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21997
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.21957
published_at 2026-04-12T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.219
published_at 2026-04-13T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21901
published_at 2026-04-16T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21907
published_at 2026-04-18T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.21868
published_at 2026-04-21T12:55:00Z
12
value 0.00072
scoring_system epss
scoring_elements 0.21721
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1660493
reference_id 1660493
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1660493
9
reference_url https://xenbits.xen.org/xsa/advisory-282.html
reference_id XSA-282
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-282.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-19967, XSA-282
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6b1e-39na-b7gf
3
url VCID-6jsn-7538-a7ha
vulnerability_id VCID-6jsn-7538-a7ha
summary L1 Terminal Fault speculative side channel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3646
reference_id
reference_type
scores
0
value 0.03877
scoring_system epss
scoring_elements 0.88182
published_at 2026-04-01T12:55:00Z
1
value 0.03877
scoring_system epss
scoring_elements 0.88231
published_at 2026-04-08T12:55:00Z
2
value 0.03877
scoring_system epss
scoring_elements 0.88237
published_at 2026-04-09T12:55:00Z
3
value 0.03877
scoring_system epss
scoring_elements 0.88249
published_at 2026-04-11T12:55:00Z
4
value 0.03877
scoring_system epss
scoring_elements 0.88242
published_at 2026-04-12T12:55:00Z
5
value 0.03877
scoring_system epss
scoring_elements 0.88241
published_at 2026-04-13T12:55:00Z
6
value 0.03877
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-16T12:55:00Z
7
value 0.03877
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-18T12:55:00Z
8
value 0.03877
scoring_system epss
scoring_elements 0.8819
published_at 2026-04-02T12:55:00Z
9
value 0.03877
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-04T12:55:00Z
10
value 0.03877
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-07T12:55:00Z
11
value 0.0398
scoring_system epss
scoring_elements 0.88411
published_at 2026-04-21T12:55:00Z
12
value 0.0398
scoring_system epss
scoring_elements 0.88427
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1585005
reference_id 1585005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1585005
9
reference_url https://security.archlinux.org/AVG-756
reference_id AVG-756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-756
10
reference_url https://security.archlinux.org/AVG-757
reference_id AVG-757
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-757
11
reference_url https://security.archlinux.org/AVG-758
reference_id AVG-758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-758
12
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
13
reference_url https://access.redhat.com/errata/RHSA-2018:2384
reference_id RHSA-2018:2384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2384
14
reference_url https://access.redhat.com/errata/RHSA-2018:2387
reference_id RHSA-2018:2387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2387
15
reference_url https://access.redhat.com/errata/RHSA-2018:2388
reference_id RHSA-2018:2388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2388
16
reference_url https://access.redhat.com/errata/RHSA-2018:2389
reference_id RHSA-2018:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2389
17
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
18
reference_url https://access.redhat.com/errata/RHSA-2018:2391
reference_id RHSA-2018:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2391
19
reference_url https://access.redhat.com/errata/RHSA-2018:2392
reference_id RHSA-2018:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2392
20
reference_url https://access.redhat.com/errata/RHSA-2018:2393
reference_id RHSA-2018:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2393
21
reference_url https://access.redhat.com/errata/RHSA-2018:2394
reference_id RHSA-2018:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2394
22
reference_url https://access.redhat.com/errata/RHSA-2018:2395
reference_id RHSA-2018:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2395
23
reference_url https://access.redhat.com/errata/RHSA-2018:2396
reference_id RHSA-2018:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2396
24
reference_url https://access.redhat.com/errata/RHSA-2018:2402
reference_id RHSA-2018:2402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2402
25
reference_url https://access.redhat.com/errata/RHSA-2018:2403
reference_id RHSA-2018:2403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2403
26
reference_url https://access.redhat.com/errata/RHSA-2018:2404
reference_id RHSA-2018:2404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2404
27
reference_url https://access.redhat.com/errata/RHSA-2018:2602
reference_id RHSA-2018:2602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2602
28
reference_url https://access.redhat.com/errata/RHSA-2018:2603
reference_id RHSA-2018:2603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2603
29
reference_url https://usn.ubuntu.com/3740-1/
reference_id USN-3740-1
reference_type
scores
url https://usn.ubuntu.com/3740-1/
30
reference_url https://usn.ubuntu.com/3740-2/
reference_id USN-3740-2
reference_type
scores
url https://usn.ubuntu.com/3740-2/
31
reference_url https://usn.ubuntu.com/3741-1/
reference_id USN-3741-1
reference_type
scores
url https://usn.ubuntu.com/3741-1/
32
reference_url https://usn.ubuntu.com/3741-2/
reference_id USN-3741-2
reference_type
scores
url https://usn.ubuntu.com/3741-2/
33
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
34
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
35
reference_url https://usn.ubuntu.com/3756-1/
reference_id USN-3756-1
reference_type
scores
url https://usn.ubuntu.com/3756-1/
36
reference_url https://usn.ubuntu.com/3823-1/
reference_id USN-3823-1
reference_type
scores
url https://usn.ubuntu.com/3823-1/
37
reference_url https://xenbits.xen.org/xsa/advisory-273.html
reference_id XSA-273
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-273.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-3646, XSA-273
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha
4
url VCID-an7r-pjrv-pyde
vulnerability_id VCID-an7r-pjrv-pyde
summary Fix for XSA-240 conflicts with shadow paging
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19966.json
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19966
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31523
published_at 2026-04-07T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.3166
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31705
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31575
published_at 2026-04-08T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31605
published_at 2026-04-09T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.3161
published_at 2026-04-11T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31567
published_at 2026-04-12T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.3153
published_at 2026-04-13T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31564
published_at 2026-04-16T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31541
published_at 2026-04-18T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31509
published_at 2026-04-21T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31335
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19966
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1652235
reference_id 1652235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1652235
9
reference_url https://xenbits.xen.org/xsa/advisory-280.html
reference_id XSA-280
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-280.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-19966, XSA-280
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-an7r-pjrv-pyde
5
url VCID-cuab-yybg-6uhs
vulnerability_id VCID-cuab-yybg-6uhs
summary Use of v2 grant tables may cause crash on ARM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15469
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39828
published_at 2026-04-01T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39974
published_at 2026-04-02T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.40002
published_at 2026-04-04T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39923
published_at 2026-04-07T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39976
published_at 2026-04-08T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-09T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.4
published_at 2026-04-11T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39964
published_at 2026-04-12T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39944
published_at 2026-04-13T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39994
published_at 2026-04-16T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39966
published_at 2026-04-18T12:55:00Z
11
value 0.00182
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-21T12:55:00Z
12
value 0.00182
scoring_system epss
scoring_elements 0.39714
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15469
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610543
reference_id 1610543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610543
8
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
9
reference_url https://xenbits.xen.org/xsa/advisory-268.html
reference_id XSA-268
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-268.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-15469, XSA-268
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuab-yybg-6uhs
6
url VCID-rn1h-xy8j-uqgs
vulnerability_id VCID-rn1h-xy8j-uqgs
summary x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15468
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30206
published_at 2026-04-01T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30236
published_at 2026-04-02T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30285
published_at 2026-04-04T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30102
published_at 2026-04-07T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30162
published_at 2026-04-08T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30198
published_at 2026-04-09T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30201
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30157
published_at 2026-04-12T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30108
published_at 2026-04-13T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30123
published_at 2026-04-16T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30106
published_at 2026-04-18T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.3006
published_at 2026-04-21T12:55:00Z
12
value 0.00115
scoring_system epss
scoring_elements 0.2999
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15468
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610548
reference_id 1610548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610548
9
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
10
reference_url https://xenbits.xen.org/xsa/advisory-269.html
reference_id XSA-269
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-269.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-15468, XSA-269
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rn1h-xy8j-uqgs
7
url VCID-veqg-epht-cuaz
vulnerability_id VCID-veqg-epht-cuaz
summary insufficient TLB flushing / improper large page mappings with AMD IOMMUs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19962.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19962.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19962
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39631
published_at 2026-04-01T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.3978
published_at 2026-04-02T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39803
published_at 2026-04-04T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39722
published_at 2026-04-07T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39775
published_at 2026-04-08T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.3979
published_at 2026-04-09T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39799
published_at 2026-04-11T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39763
published_at 2026-04-12T12:55:00Z
8
value 0.00181
scoring_system epss
scoring_elements 0.39747
published_at 2026-04-13T12:55:00Z
9
value 0.00181
scoring_system epss
scoring_elements 0.39797
published_at 2026-04-16T12:55:00Z
10
value 0.00181
scoring_system epss
scoring_elements 0.39768
published_at 2026-04-18T12:55:00Z
11
value 0.00181
scoring_system epss
scoring_elements 0.39685
published_at 2026-04-21T12:55:00Z
12
value 0.00181
scoring_system epss
scoring_elements 0.39505
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19962
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1647573
reference_id 1647573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1647573
9
reference_url https://xenbits.xen.org/xsa/advisory-275.html
reference_id XSA-275
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-275.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-19962, XSA-275
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-veqg-epht-cuaz
8
url VCID-werg-d7s2-kfbw
vulnerability_id VCID-werg-d7s2-kfbw
summary x86: DoS from attempting to use INVPCID with a non-canonical addresses
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19965.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-19965
reference_id
reference_type
scores
0
value 0.0018
scoring_system epss
scoring_elements 0.39454
published_at 2026-04-01T12:55:00Z
1
value 0.0018
scoring_system epss
scoring_elements 0.39603
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39626
published_at 2026-04-04T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39542
published_at 2026-04-07T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39596
published_at 2026-04-08T12:55:00Z
5
value 0.0018
scoring_system epss
scoring_elements 0.39612
published_at 2026-04-09T12:55:00Z
6
value 0.0018
scoring_system epss
scoring_elements 0.39622
published_at 2026-04-11T12:55:00Z
7
value 0.0018
scoring_system epss
scoring_elements 0.39585
published_at 2026-04-12T12:55:00Z
8
value 0.0018
scoring_system epss
scoring_elements 0.39569
published_at 2026-04-13T12:55:00Z
9
value 0.0018
scoring_system epss
scoring_elements 0.39619
published_at 2026-04-16T12:55:00Z
10
value 0.0018
scoring_system epss
scoring_elements 0.39589
published_at 2026-04-18T12:55:00Z
11
value 0.0018
scoring_system epss
scoring_elements 0.39504
published_at 2026-04-21T12:55:00Z
12
value 0.0018
scoring_system epss
scoring_elements 0.39324
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-19965
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1647588
reference_id 1647588
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1647588
8
reference_url https://xenbits.xen.org/xsa/advisory-279.html
reference_id XSA-279
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-279.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-19965, XSA-279
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-werg-d7s2-kfbw
9
url VCID-xubx-wxc9-tfay
vulnerability_id VCID-xubx-wxc9-tfay
summary x86: Nested VT-x usable even when disabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18883.json
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-18883
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38394
published_at 2026-04-01T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38531
published_at 2026-04-02T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38556
published_at 2026-04-04T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38419
published_at 2026-04-07T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38469
published_at 2026-04-08T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38477
published_at 2026-04-16T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.38492
published_at 2026-04-11T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38455
published_at 2026-04-12T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.38429
published_at 2026-04-13T12:55:00Z
9
value 0.00172
scoring_system epss
scoring_elements 0.38456
published_at 2026-04-18T12:55:00Z
10
value 0.00172
scoring_system epss
scoring_elements 0.38392
published_at 2026-04-21T12:55:00Z
11
value 0.00172
scoring_system epss
scoring_elements 0.38235
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-18883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1643116
reference_id 1643116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1643116
5
reference_url https://xenbits.xen.org/xsa/advisory-278.html
reference_id XSA-278
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-278.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-18883, XSA-278
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xubx-wxc9-tfay
10
url VCID-yh4r-yysd-1ua5
vulnerability_id VCID-yh4r-yysd-1ua5
summary oxenstored does not apply quota-maxentity
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15470
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39828
published_at 2026-04-01T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39974
published_at 2026-04-02T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.40002
published_at 2026-04-04T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39923
published_at 2026-04-07T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39976
published_at 2026-04-08T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-09T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.4
published_at 2026-04-11T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39964
published_at 2026-04-12T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39944
published_at 2026-04-13T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39994
published_at 2026-04-16T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39966
published_at 2026-04-18T12:55:00Z
11
value 0.00182
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-21T12:55:00Z
12
value 0.00182
scoring_system epss
scoring_elements 0.39714
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15470
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610552
reference_id 1610552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610552
8
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
9
reference_url https://xenbits.xen.org/xsa/advisory-272.html
reference_id XSA-272
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-272.html
fixed_packages
0
url pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
purl pkg:apk/alpine/xen@4.11.1-r0?arch=s390x&distroversion=v3.12&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main
aliases CVE-2018-15470, XSA-272
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yh4r-yysd-1ua5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.11.1-r0%3Farch=s390x&distroversion=v3.12&reponame=main