Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/433774?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "type": "apk", "namespace": "alpine", "name": "xen", "version": "4.8.5-r0", "qualifiers": { "arch": "ppc64le", "distroversion": "v3.6", "reponame": "main" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4169?format=api", "vulnerability_id": "VCID-6b1e-39na-b7gf", "summary": "guest use of HLE constructs may lock up host", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19967.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19967.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19967", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21875", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22037", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22089", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21854", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21929", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21985", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21997", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21957", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21901", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21907", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21868", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21721", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660493", "reference_id": "1660493", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660493" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-282.html", "reference_id": "XSA-282", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-282.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-19967", "XSA-282" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6b1e-39na-b7gf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=api", "vulnerability_id": "VCID-6jsn-7538-a7ha", "summary": "L1 Terminal Fault speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88182", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88242", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88241", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88254", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.8819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0398", "scoring_system": "epss", "scoring_elements": "0.88411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0398", "scoring_system": "epss", "scoring_elements": "0.88427", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005", "reference_id": "1585005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "reference_url": "https://security.archlinux.org/AVG-756", "reference_id": "AVG-756", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-756" }, { "reference_url": "https://security.archlinux.org/AVG-757", "reference_id": "AVG-757", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-757" }, { "reference_url": "https://security.archlinux.org/AVG-758", "reference_id": "AVG-758", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-758" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384", "reference_id": "RHSA-2018:2384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387", "reference_id": "RHSA-2018:2387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388", "reference_id": "RHSA-2018:2388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389", "reference_id": "RHSA-2018:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390", "reference_id": "RHSA-2018:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391", "reference_id": "RHSA-2018:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392", "reference_id": "RHSA-2018:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393", "reference_id": "RHSA-2018:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394", "reference_id": "RHSA-2018:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395", "reference_id": "RHSA-2018:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396", "reference_id": "RHSA-2018:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402", "reference_id": "RHSA-2018:2402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403", "reference_id": "RHSA-2018:2403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404", "reference_id": "RHSA-2018:2404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602", "reference_id": "RHSA-2018:2602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603", "reference_id": "RHSA-2018:2603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "reference_url": "https://usn.ubuntu.com/3740-1/", "reference_id": "USN-3740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3740-1/" }, { "reference_url": "https://usn.ubuntu.com/3740-2/", "reference_id": "USN-3740-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3740-2/" }, { "reference_url": "https://usn.ubuntu.com/3741-1/", "reference_id": "USN-3741-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3741-1/" }, { "reference_url": "https://usn.ubuntu.com/3741-2/", "reference_id": "USN-3741-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3741-2/" }, { "reference_url": "https://usn.ubuntu.com/3742-1/", "reference_id": "USN-3742-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3742-1/" }, { "reference_url": "https://usn.ubuntu.com/3742-2/", "reference_id": "USN-3742-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3742-2/" }, { "reference_url": "https://usn.ubuntu.com/3756-1/", "reference_id": "USN-3756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3756-1/" }, { "reference_url": "https://usn.ubuntu.com/3823-1/", "reference_id": "USN-3823-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3823-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html", "reference_id": "XSA-273", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-273.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-3646", "XSA-273" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4168?format=api", "vulnerability_id": "VCID-an7r-pjrv-pyde", "summary": "Fix for XSA-240 conflicts with shadow paging", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19966.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19966.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19966", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31575", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3153", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31564", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31541", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31335", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652235", "reference_id": "1652235", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652235" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-280.html", "reference_id": "XSA-280", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-280.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-19966", "XSA-280" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-an7r-pjrv-pyde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4154?format=api", "vulnerability_id": "VCID-cuab-yybg-6uhs", "summary": "Use of v2 grant tables may cause crash on ARM", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.40002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.3999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.4", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39714", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610543", "reference_id": "1610543", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610543" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-268.html", "reference_id": "XSA-268", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-268.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-15469", "XSA-268" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cuab-yybg-6uhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4155?format=api", "vulnerability_id": "VCID-rn1h-xy8j-uqgs", "summary": "x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30206", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30285", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30102", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30198", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30201", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30123", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30106", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3006", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.2999", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610548", "reference_id": "1610548", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610548" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-269.html", "reference_id": "XSA-269", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-269.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-15468", "XSA-269" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rn1h-xy8j-uqgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4163?format=api", "vulnerability_id": "VCID-veqg-epht-cuaz", "summary": "insufficient TLB flushing / improper large page mappings with AMD IOMMUs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19962.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19962.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19962", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39631", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.3978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39803", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39775", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.3979", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39799", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39747", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39797", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39768", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39685", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39505", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647573", "reference_id": "1647573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647573" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-275.html", "reference_id": "XSA-275", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-275.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-19962", "XSA-275" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-veqg-epht-cuaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4167?format=api", "vulnerability_id": "VCID-werg-d7s2-kfbw", "summary": "x86: DoS from attempting to use INVPCID with a non-canonical addresses", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19965.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19965.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19965", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39626", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39596", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39612", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39622", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39585", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39619", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39324", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-19965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647588", "reference_id": "1647588", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1647588" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-279.html", "reference_id": "XSA-279", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-279.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-19965", "XSA-279" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-werg-d7s2-kfbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4166?format=api", "vulnerability_id": "VCID-xubx-wxc9-tfay", "summary": "x86: Nested VT-x usable even when disabled", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18883.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-18883.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18883", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38419", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38469", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38455", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38429", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38456", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38392", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00172", "scoring_system": "epss", "scoring_elements": "0.38235", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-18883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18883" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643116", "reference_id": "1643116", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1643116" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-278.html", "reference_id": "XSA-278", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-278.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-18883", "XSA-278" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xubx-wxc9-tfay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4158?format=api", "vulnerability_id": "VCID-yh4r-yysd-1ua5", "summary": "oxenstored does not apply quota-maxentity", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.40002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.3999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.4", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39714", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610552", "reference_id": "1610552", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610552" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-272.html", "reference_id": "XSA-272", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-272.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433774?format=api", "purl": "pkg:apk/alpine/xen@4.8.5-r0?arch=ppc64le&distroversion=v3.6&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" } ], "aliases": [ "CVE-2018-15470", "XSA-272" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yh4r-yysd-1ua5" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.8.5-r0%3Farch=ppc64le&distroversion=v3.6&reponame=main" }