Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
Typeapk
Namespacealpine
Namexen
Version4.14.0-r1
Qualifiers
arch s390x
distroversion v3.20
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.14.0-r2
Latest_non_vulnerable_version4.18.5-r6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3whm-8fyv-zyhd
vulnerability_id VCID-3whm-8fyv-zyhd
summary race when migrating timers between x86 HVM vCPU-s
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25604.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25604
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21783
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21948
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.22002
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21767
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21844
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.219
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21911
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21871
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21814
published_at 2026-04-13T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21817
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21823
published_at 2026-04-18T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21787
published_at 2026-04-21T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21639
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25604
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877382
reference_id 1877382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877382
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-336.html
reference_id XSA-336
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-336.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25604, XSA-336
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3whm-8fyv-zyhd
1
url VCID-bs56-1z79-uqbt
vulnerability_id VCID-bs56-1z79-uqbt
summary x86 pv guest kernel DoS via SYSENTER
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25596.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25596.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25596
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24863
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24982
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24755
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24823
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24867
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24881
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24843
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24787
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24799
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24791
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24768
published_at 2026-04-21T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24707
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25596
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880137
reference_id 1880137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880137
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-339.html
reference_id XSA-339
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-339.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25596, XSA-339
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bs56-1z79-uqbt
2
url VCID-bzve-5gwu-8ydb
vulnerability_id VCID-bzve-5gwu-8ydb
summary x86 pv: Crash when handling guest access to MSR_MISC_ENABLE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25602.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25602
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23866
published_at 2026-04-01T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23986
published_at 2026-04-02T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24025
published_at 2026-04-04T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.2381
published_at 2026-04-07T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23877
published_at 2026-04-08T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23923
published_at 2026-04-09T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.2394
published_at 2026-04-11T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23896
published_at 2026-04-12T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-13T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23853
published_at 2026-04-16T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23842
published_at 2026-04-18T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23822
published_at 2026-04-21T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23704
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880158
reference_id 1880158
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880158
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-333.html
reference_id XSA-333
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-333.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25602, XSA-333
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzve-5gwu-8ydb
3
url VCID-dqy9-zkvw-e3gk
vulnerability_id VCID-dqy9-zkvw-e3gk
summary lack of preemption in evtchn_reset() / evtchn_destroy()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25601.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25601
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22683
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22858
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22902
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22695
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22771
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22823
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22845
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22808
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22751
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22765
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22761
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.2272
published_at 2026-04-21T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22557
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877378
reference_id 1877378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877378
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-344.html
reference_id XSA-344
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-344.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25601, XSA-344
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqy9-zkvw-e3gk
4
url VCID-eb8v-p31a-yuhu
vulnerability_id VCID-eb8v-p31a-yuhu
summary once valid event channels may not turn invalid
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25597.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25597
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29184
published_at 2026-04-01T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.2926
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.2931
published_at 2026-04-04T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29122
published_at 2026-04-07T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29187
published_at 2026-04-08T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29227
published_at 2026-04-09T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29233
published_at 2026-04-11T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29186
published_at 2026-04-12T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29134
published_at 2026-04-13T12:55:00Z
9
value 0.00109
scoring_system epss
scoring_elements 0.2916
published_at 2026-04-16T12:55:00Z
10
value 0.00109
scoring_system epss
scoring_elements 0.29137
published_at 2026-04-18T12:55:00Z
11
value 0.00109
scoring_system epss
scoring_elements 0.29088
published_at 2026-04-21T12:55:00Z
12
value 0.00109
scoring_system epss
scoring_elements 0.28968
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879553
reference_id 1879553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879553
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-338.html
reference_id XSA-338
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-338.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25597, XSA-338
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eb8v-p31a-yuhu
5
url VCID-ep7n-um5m-ekgk
vulnerability_id VCID-ep7n-um5m-ekgk
summary PCI passthrough code reading back hardware registers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25595.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25595
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25165
published_at 2026-04-01T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25245
published_at 2026-04-02T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.25284
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25056
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25126
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25171
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25184
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25141
published_at 2026-04-12T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25089
published_at 2026-04-13T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.251
published_at 2026-04-16T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25091
published_at 2026-04-18T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25062
published_at 2026-04-21T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.25002
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877369
reference_id 1877369
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877369
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-337.html
reference_id XSA-337
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-337.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25595, XSA-337
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep7n-um5m-ekgk
6
url VCID-j9gy-kfvu-4bat
vulnerability_id VCID-j9gy-kfvu-4bat
summary Missing unlock in XENMEM_acquire_resource error path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25598.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25598
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22123
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22282
published_at 2026-04-02T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22324
published_at 2026-04-04T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22109
published_at 2026-04-07T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22192
published_at 2026-04-08T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22246
published_at 2026-04-09T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22265
published_at 2026-04-11T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-12T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22164
published_at 2026-04-13T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22165
published_at 2026-04-16T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.2216
published_at 2026-04-18T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22114
published_at 2026-04-21T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.21975
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25598
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877383
reference_id 1877383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877383
4
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
5
reference_url https://xenbits.xen.org/xsa/advisory-334.html
reference_id XSA-334
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-334.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25598, XSA-334
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9gy-kfvu-4bat
7
url VCID-p7ug-wwk5-63gb
vulnerability_id VCID-p7ug-wwk5-63gb
summary out of bounds event channels available to 32-bit x86 domains
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25600.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25600
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27816
published_at 2026-04-01T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27866
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27906
published_at 2026-04-04T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27698
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27766
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27808
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27814
published_at 2026-04-11T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27772
published_at 2026-04-12T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27715
published_at 2026-04-13T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27723
published_at 2026-04-16T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27697
published_at 2026-04-18T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27658
published_at 2026-04-21T12:55:00Z
12
value 0.001
scoring_system epss
scoring_elements 0.27605
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1880156
reference_id 1880156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1880156
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-342.html
reference_id XSA-342
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-342.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25600, XSA-342
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p7ug-wwk5-63gb
8
url VCID-vb2u-yc2z-ayh5
vulnerability_id VCID-vb2u-yc2z-ayh5
summary Missing memory barriers when accessing/allocating an event channel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25603.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25603
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21923
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22085
published_at 2026-04-02T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-04T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21911
published_at 2026-04-07T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21992
published_at 2026-04-08T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22047
published_at 2026-04-09T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22062
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22021
published_at 2026-04-12T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21961
published_at 2026-04-13T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.2196
published_at 2026-04-16T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.21956
published_at 2026-04-18T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.21913
published_at 2026-04-21T12:55:00Z
12
value 0.00072
scoring_system epss
scoring_elements 0.21767
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1877366
reference_id 1877366
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1877366
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-340.html
reference_id XSA-340
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-340.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25603, XSA-340
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vb2u-yc2z-ayh5
9
url VCID-xe4j-gg7f-wyfa
vulnerability_id VCID-xe4j-gg7f-wyfa
summary races with evtchn_reset()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25599.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25599
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22299
published_at 2026-04-07T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.2251
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22381
published_at 2026-04-08T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22436
published_at 2026-04-09T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22457
published_at 2026-04-11T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22416
published_at 2026-04-12T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.2236
published_at 2026-04-13T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22379
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22375
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22323
published_at 2026-04-21T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22174
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879567
reference_id 1879567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879567
13
reference_url https://security.gentoo.org/glsa/202011-06
reference_id GLSA-202011-06
reference_type
scores
url https://security.gentoo.org/glsa/202011-06
14
reference_url https://usn.ubuntu.com/5617-1/
reference_id USN-5617-1
reference_type
scores
url https://usn.ubuntu.com/5617-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-343.html
reference_id XSA-343
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-343.html
fixed_packages
0
url pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
purl pkg:apk/alpine/xen@4.14.0-r1?arch=s390x&distroversion=v3.20&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main
aliases CVE-2020-25599, XSA-343
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xe4j-gg7f-wyfa
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.14.0-r1%3Farch=s390x&distroversion=v3.20&reponame=main