Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
Typeapk
Namespacealpine
Namexen
Version4.15.4-r0
Qualifiers
arch s390x
distroversion v3.15
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.15.4-r1
Latest_non_vulnerable_version4.15.5-r3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6xbp-t4qh-tbhv
vulnerability_id VCID-6xbp-t4qh-tbhv
summary Xenstore: guests can let run xenstored out of memory
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42312
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.2457
published_at 2026-04-24T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24626
published_at 2026-04-21T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36572
published_at 2026-04-18T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.3659
published_at 2026-04-16T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36545
published_at 2026-04-13T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36569
published_at 2026-04-12T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36603
published_at 2026-04-11T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36596
published_at 2026-04-09T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.36577
published_at 2026-04-08T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36688
published_at 2026-04-04T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36525
published_at 2026-04-07T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42312
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url http://xenbits.xen.org/xsa/advisory-326.html
reference_id advisory-326.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/
url http://xenbits.xen.org/xsa/advisory-326.html
25
reference_url https://xenbits.xenproject.org/xsa/advisory-326.txt
reference_id advisory-326.txt
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/
url https://xenbits.xenproject.org/xsa/advisory-326.txt
26
reference_url https://www.debian.org/security/2022/dsa-5272
reference_id dsa-5272
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/
url https://www.debian.org/security/2022/dsa-5272
27
reference_url https://xenbits.xen.org/xsa/advisory-326.html
reference_id XSA-326
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-326.html
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
reference_id YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
reference_id YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
reference_id ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42312, XSA-326
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xbp-t4qh-tbhv
1
url VCID-7ek3-weqx-9fhs
vulnerability_id VCID-7ek3-weqx-9fhs
summary x86: Multiple speculative security issues
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23824
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10821
published_at 2026-04-16T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1263
published_at 2026-04-24T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12507
published_at 2026-04-18T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12621
published_at 2026-04-21T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14768
published_at 2026-04-07T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14913
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14874
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14838
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14779
published_at 2026-04-13T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14892
published_at 2026-04-02T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14859
published_at 2026-04-08T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14967
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119127
reference_id 2119127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119127
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-422.html
reference_id XSA-422
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-422.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-23824, XSA-422
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ek3-weqx-9fhs
2
url VCID-8cb8-vq2c-q3e9
vulnerability_id VCID-8cb8-vq2c-q3e9
summary Xenstore: Guests can crash xenstored
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42309
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16825
published_at 2026-04-09T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16846
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16902
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16686
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16771
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18818
published_at 2026-04-16T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18918
published_at 2026-04-12T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18867
published_at 2026-04-13T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18831
published_at 2026-04-18T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19594
published_at 2026-04-24T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19701
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42309
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-414.html
reference_id XSA-414
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-414.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.3-r3?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.3-r3?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.3-r3%3Farch=s390x&distroversion=v3.15&reponame=main
1
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42309, XSA-414
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cb8-vq2c-q3e9
3
url VCID-8htb-kgr8-3yes
vulnerability_id VCID-8htb-kgr8-3yes
summary network backend may cause Linux netfront to use freed SKBs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33743.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-33743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33743
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07575
published_at 2026-04-02T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07618
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07591
published_at 2026-04-07T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.0765
published_at 2026-04-08T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07668
published_at 2026-04-09T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07669
published_at 2026-04-11T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07655
published_at 2026-04-12T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.0764
published_at 2026-04-13T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-16T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07554
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07694
published_at 2026-04-21T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07644
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2107924
reference_id 2107924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2107924
13
reference_url https://access.redhat.com/errata/RHSA-2023:2148
reference_id RHSA-2023:2148
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2148
14
reference_url https://access.redhat.com/errata/RHSA-2023:2458
reference_id RHSA-2023:2458
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2458
15
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
16
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
17
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
18
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
19
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
20
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
21
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
22
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
23
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
24
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
25
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
26
reference_url https://xenbits.xen.org/xsa/advisory-405.html
reference_id XSA-405
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-405.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-33743, XSA-405
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8htb-kgr8-3yes
4
url VCID-91hk-73kq-83g6
vulnerability_id VCID-91hk-73kq-83g6
summary lock order inversion in transitive grant copy handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33748
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11646
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11778
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11821
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11609
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11693
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11748
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11761
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11723
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11699
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1156
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11563
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11686
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33748
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
reference_id 1021668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
25
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
26
reference_url https://xenbits.xen.org/xsa/advisory-411.html
reference_id XSA-411
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-411.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-33748, XSA-411
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-91hk-73kq-83g6
5
url VCID-dfjm-gwzm-jqbt
vulnerability_id VCID-dfjm-gwzm-jqbt
summary Oxenstored 32->31 bit integer truncation issues
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42324
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.1015
published_at 2026-04-04T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10047
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10122
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10183
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10087
published_at 2026-04-02T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-18T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11713
published_at 2026-04-21T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11671
published_at 2026-04-24T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.1179
published_at 2026-04-11T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11751
published_at 2026-04-12T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11726
published_at 2026-04-13T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11589
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42324
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-420.html
reference_id XSA-420
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-420.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42324, XSA-420
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfjm-gwzm-jqbt
6
url VCID-dgm4-ye4m-1fcq
vulnerability_id VCID-dgm4-ye4m-1fcq
summary Xenstore: Guests can get access to Xenstore nodes of deleted domains
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42320
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12428
published_at 2026-04-04T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12384
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12359
published_at 2026-04-09T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12308
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-07T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14067
published_at 2026-04-12T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14108
published_at 2026-04-11T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.13898
published_at 2026-04-18T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.13907
published_at 2026-04-16T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14013
published_at 2026-04-13T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.1481
published_at 2026-04-24T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14774
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42320
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url http://www.openwall.com/lists/oss-security/2022/11/01/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url http://www.openwall.com/lists/oss-security/2022/11/01/7
25
reference_url http://xenbits.xen.org/xsa/advisory-417.html
reference_id advisory-417.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url http://xenbits.xen.org/xsa/advisory-417.html
26
reference_url https://xenbits.xenproject.org/xsa/advisory-417.txt
reference_id advisory-417.txt
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://xenbits.xenproject.org/xsa/advisory-417.txt
27
reference_url https://www.debian.org/security/2022/dsa-5272
reference_id dsa-5272
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://www.debian.org/security/2022/dsa-5272
28
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://security.gentoo.org/glsa/202402-07
29
reference_url https://xenbits.xen.org/xsa/advisory-417.html
reference_id XSA-417
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-417.html
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
reference_id YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
reference_id YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
reference_id ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42320, XSA-417
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgm4-ye4m-1fcq
7
url VCID-eaz5-1yjy-cybd
vulnerability_id VCID-eaz5-1yjy-cybd
summary x86: unintended memory sharing between guests
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42327
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0265
published_at 2026-04-12T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02663
published_at 2026-04-11T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02739
published_at 2026-04-24T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02748
published_at 2026-04-21T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02638
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.0263
published_at 2026-04-16T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02647
published_at 2026-04-13T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05215
published_at 2026-04-07T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-02T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05266
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05248
published_at 2026-04-08T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05193
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42327
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url http://www.openwall.com/lists/oss-security/2022/11/01/3
reference_id 3
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url http://www.openwall.com/lists/oss-security/2022/11/01/3
3
reference_url http://xenbits.xen.org/xsa/advisory-412.html
reference_id advisory-412.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url http://xenbits.xen.org/xsa/advisory-412.html
4
reference_url https://xenbits.xenproject.org/xsa/advisory-412.txt
reference_id advisory-412.txt
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://xenbits.xenproject.org/xsa/advisory-412.txt
5
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://security.gentoo.org/glsa/202402-07
6
reference_url https://xenbits.xen.org/xsa/advisory-412.html
reference_id XSA-412
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-412.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
reference_id YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
reference_id ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42327, XSA-412
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eaz5-1yjy-cybd
8
url VCID-fhbs-3nvf-tbha
vulnerability_id VCID-fhbs-3nvf-tbha
summary Arm: unbounded memory consumption for 2nd-level page tables
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33747
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08339
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08391
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08312
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08376
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08392
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08384
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08365
published_at 2026-04-12T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08349
published_at 2026-04-13T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08242
published_at 2026-04-16T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08227
published_at 2026-04-18T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08388
published_at 2026-04-21T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.0836
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33747
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
reference_id 1021668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-409.html
reference_id XSA-409
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-409.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-33747, XSA-409
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhbs-3nvf-tbha
9
url VCID-gj1u-mbaj-kyc5
vulnerability_id VCID-gj1u-mbaj-kyc5
summary Xenstore: Guests can create orphaned Xenstore nodes
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42310
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-09T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06008
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06043
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-08T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07039
published_at 2026-04-16T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07124
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07114
published_at 2026-04-12T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-13T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07528
published_at 2026-04-24T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42310
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-415.html
reference_id XSA-415
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-415.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42310, XSA-415
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gj1u-mbaj-kyc5
10
url VCID-hsau-swt9-kyf7
vulnerability_id VCID-hsau-swt9-kyf7
summary Xenstore: Guests can cause Xenstore to not free temporary memory
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42319
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06792
published_at 2026-04-09T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06679
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06724
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06708
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06759
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07834
published_at 2026-04-16T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07948
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07931
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07918
published_at 2026-04-13T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07818
published_at 2026-04-18T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08393
published_at 2026-04-24T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08423
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42319
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-416.html
reference_id XSA-416
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-416.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42319, XSA-416
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsau-swt9-kyf7
11
url VCID-n3xk-y5zd-hqcu
vulnerability_id VCID-n3xk-y5zd-hqcu
summary XAPI open file limit DoS
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33749
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53204
published_at 2026-04-24T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53145
published_at 2026-04-02T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53169
published_at 2026-04-04T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53137
published_at 2026-04-07T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53191
published_at 2026-04-08T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53183
published_at 2026-04-09T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53234
published_at 2026-04-11T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.5322
published_at 2026-04-12T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53203
published_at 2026-04-13T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53241
published_at 2026-04-16T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.53247
published_at 2026-04-18T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.5323
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33749
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
3
reference_url https://xenbits.xen.org/xsa/advisory-413.html
reference_id XSA-413
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-413.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-33749, XSA-413
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n3xk-y5zd-hqcu
12
url VCID-pb8n-hmsc-syfw
vulnerability_id VCID-pb8n-hmsc-syfw
summary P2M pool freeing may take excessively long
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33746
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11732
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11867
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11912
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11698
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11782
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11835
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11845
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11806
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11779
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11643
published_at 2026-04-18T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11764
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33746
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
reference_id 1021668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
25
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
26
reference_url https://xenbits.xen.org/xsa/advisory-410.html
reference_id XSA-410
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-410.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-33746, XSA-410
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pb8n-hmsc-syfw
13
url VCID-pphm-ygb7-q7g2
vulnerability_id VCID-pphm-ygb7-q7g2
summary Xenstore: Cooperating guests can create arbitrary numbers of nodes
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42322
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09802
published_at 2026-04-09T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09727
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09776
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09681
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09752
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11254
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11455
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11393
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11255
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-24T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-419.html
reference_id XSA-419
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-419.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42322, XSA-419
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pphm-ygb7-q7g2
14
url VCID-qnew-xqte-kbej
vulnerability_id VCID-qnew-xqte-kbej
summary Xenstore: Guests can crash xenstored via exhausting the stack
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42321
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.084
published_at 2026-04-09T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08345
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08398
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0832
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09504
published_at 2026-04-16T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09661
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09613
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09509
published_at 2026-04-18T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10241
published_at 2026-04-24T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10261
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-418.html
reference_id XSA-418
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-418.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42321, XSA-418
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnew-xqte-kbej
15
url VCID-vdkg-17sq-mbgy
vulnerability_id VCID-vdkg-17sq-mbgy
summary Arm guests can cause Dom0 DoS via PV devices
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33744
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17548
published_at 2026-04-24T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17601
published_at 2026-04-18T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17637
published_at 2026-04-21T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17576
published_at 2026-04-07T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17665
published_at 2026-04-08T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17726
published_at 2026-04-09T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17744
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17699
published_at 2026-04-12T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17647
published_at 2026-04-13T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17593
published_at 2026-04-16T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27836
published_at 2026-04-04T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27797
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33744
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
10
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
11
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
12
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
13
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
14
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
15
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
16
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
17
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
18
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
19
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
20
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
21
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
22
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
23
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
24
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
25
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
26
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
27
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
28
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
29
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
30
reference_url https://xenbits.xen.org/xsa/advisory-406.html
reference_id XSA-406
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-406.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-33744, XSA-406
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vdkg-17sq-mbgy
16
url VCID-wh75-sc4f-qqc1
vulnerability_id VCID-wh75-sc4f-qqc1
summary Xenstore: Guests can create arbitrary number of nodes via transactions
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42325
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09802
published_at 2026-04-09T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09727
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09776
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09681
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09752
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11254
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11455
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11393
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11255
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-24T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-421.html
reference_id XSA-421
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-421.html
fixed_packages
0
url pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.15.4-r0?arch=s390x&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main
aliases CVE-2022-42325, XSA-421
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh75-sc4f-qqc1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.15.4-r0%3Farch=s390x&distroversion=v3.15&reponame=main