Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
Typeapk
Namespacealpine
Namexen
Version4.7.1-r1
Qualifiers
arch aarch64
distroversion v3.15
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.7.1-r3
Latest_non_vulnerable_version4.15.5-r3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2qvr-9266-d7bt
vulnerability_id VCID-2qvr-9266-d7bt
summary x86 segment base write emulation lacking canonical address checks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9385.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9385
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28476
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.2857
published_at 2026-04-02T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28613
published_at 2026-04-04T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28416
published_at 2026-04-07T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28483
published_at 2026-04-12T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28526
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28434
published_at 2026-04-13T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-16T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28427
published_at 2026-04-18T12:55:00Z
10
value 0.00104
scoring_system epss
scoring_elements 0.28375
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9385
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392929
reference_id 1392929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392929
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845665
reference_id 845665
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845665
12
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
13
reference_url https://xenbits.xen.org/xsa/advisory-193.html
reference_id XSA-193
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-193.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9385, XSA-193
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2qvr-9266-d7bt
1
url VCID-49cz-nu6d-b7dq
vulnerability_id VCID-49cz-nu6d-b7dq
summary x86 64-bit bit test instruction emulation broken
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9383.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9383.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9383
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33162
published_at 2026-04-01T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.3329
published_at 2026-04-02T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33322
published_at 2026-04-04T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33154
published_at 2026-04-07T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33198
published_at 2026-04-08T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33231
published_at 2026-04-09T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33233
published_at 2026-04-11T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33193
published_at 2026-04-12T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.3317
published_at 2026-04-13T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.3321
published_at 2026-04-16T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33188
published_at 2026-04-18T12:55:00Z
11
value 0.00135
scoring_system epss
scoring_elements 0.33152
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9383
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392935
reference_id 1392935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392935
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845668
reference_id 845668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845668
12
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
13
reference_url https://xenbits.xen.org/xsa/advisory-195.html
reference_id XSA-195
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-195.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9383, XSA-195
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49cz-nu6d-b7dq
2
url VCID-a2ms-wryt-duct
vulnerability_id VCID-a2ms-wryt-duct
summary x86 software interrupt injection mis-handled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9378.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9378
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19022
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19156
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19208
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18925
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19004
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19058
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19063
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19017
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18919
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18932
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18942
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9378
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392937
reference_id 1392937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392937
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845669
reference_id 845669
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845669
6
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
7
reference_url https://xenbits.xen.org/xsa/advisory-196.html
reference_id XSA-196
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-196.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9378, XSA-196
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a2ms-wryt-duct
3
url VCID-anrs-qj58-p3fj
vulnerability_id VCID-anrs-qj58-p3fj
summary x86 null segments not always treated as unusable
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9386.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9386.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9386
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.2776
published_at 2026-04-01T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27813
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27852
published_at 2026-04-04T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27643
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.2771
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27754
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27759
published_at 2026-04-11T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27716
published_at 2026-04-12T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27658
published_at 2026-04-13T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27667
published_at 2026-04-16T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27641
published_at 2026-04-18T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27603
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9386
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392932
reference_id 1392932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392932
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845663
reference_id 845663
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845663
12
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
13
reference_url https://xenbits.xen.org/xsa/advisory-191.html
reference_id XSA-191
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-191.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9386, XSA-191
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-anrs-qj58-p3fj
4
url VCID-gr1e-xzu5-1kfh
vulnerability_id VCID-gr1e-xzu5-1kfh
summary guest 32-bit ELF symbol table load leaking host data
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9384.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9384
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23053
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23218
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23262
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23052
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23126
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23178
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23199
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23162
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23104
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23118
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.2311
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23072
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9384
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392934
reference_id 1392934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392934
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845667
reference_id 845667
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845667
6
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
7
reference_url https://xenbits.xen.org/xsa/advisory-194.html
reference_id XSA-194
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-194.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9384, XSA-194
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gr1e-xzu5-1kfh
5
url VCID-mspa-23bw-9be1
vulnerability_id VCID-mspa-23bw-9be1
summary delimiter injection vulnerabilities in pygrub
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9380.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9380
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26036
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.2612
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26161
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.2593
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.25997
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26048
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26058
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-12T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25953
published_at 2026-04-13T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25958
published_at 2026-04-16T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25939
published_at 2026-04-18T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25909
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9380
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392939
reference_id 1392939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392939
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845670
reference_id 845670
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845670
12
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
13
reference_url https://xenbits.xen.org/xsa/advisory-198.html
reference_id XSA-198
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-198.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9380, XSA-198
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mspa-23bw-9be1
6
url VCID-ya58-78es-d7bn
vulnerability_id VCID-ya58-78es-d7bn
summary qemu incautious about shared ring processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9381.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9381.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9381
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28543
published_at 2026-04-12T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28439
published_at 2026-04-21T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28509
published_at 2026-04-16T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28487
published_at 2026-04-18T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28629
published_at 2026-04-02T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28674
published_at 2026-04-04T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28479
published_at 2026-04-07T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28544
published_at 2026-04-08T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28585
published_at 2026-04-09T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28586
published_at 2026-04-11T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28493
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9381
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392938
reference_id 1392938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392938
5
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
6
reference_url https://usn.ubuntu.com/3261-1/
reference_id USN-3261-1
reference_type
scores
url https://usn.ubuntu.com/3261-1/
7
reference_url https://xenbits.xen.org/xsa/advisory-197.html
reference_id XSA-197
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-197.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9381, XSA-197
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya58-78es-d7bn
7
url VCID-yj2s-b6c9-27be
vulnerability_id VCID-yj2s-b6c9-27be
summary x86 task switch to VM86 mode mis-handled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9382.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9382
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31561
published_at 2026-04-01T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31698
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31742
published_at 2026-04-04T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.3156
published_at 2026-04-07T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31612
published_at 2026-04-08T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31642
published_at 2026-04-09T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31645
published_at 2026-04-11T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31604
published_at 2026-04-12T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31568
published_at 2026-04-13T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31602
published_at 2026-04-16T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.3158
published_at 2026-04-18T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31548
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9382
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1392933
reference_id 1392933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1392933
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845664
reference_id 845664
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=845664
12
reference_url https://security.gentoo.org/glsa/201612-56
reference_id GLSA-201612-56
reference_type
scores
url https://security.gentoo.org/glsa/201612-56
13
reference_url https://xenbits.xen.org/xsa/advisory-192.html
reference_id XSA-192
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-192.html
fixed_packages
0
url pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
purl pkg:apk/alpine/xen@4.7.1-r1?arch=aarch64&distroversion=v3.15&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main
aliases CVE-2016-9382, XSA-192
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yj2s-b6c9-27be
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.7.1-r1%3Farch=aarch64&distroversion=v3.15&reponame=main