Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/440499?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "type": "apk", "namespace": "alpine", "name": "xen", "version": "4.9.0-r0", "qualifiers": { "arch": "aarch64", "distroversion": "v3.20", "reponame": "main" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.9.0-r1", "latest_non_vulnerable_version": "4.18.5-r6", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4105?format=api", "vulnerability_id": "VCID-16hm-nyk9-5uff", "summary": "stale P2M mappings due to insufficient error checking", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10918.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82201", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.8219", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82135", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458876", "reference_id": "1458876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458876" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-222.html", "reference_id": "XSA-222", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-222.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10918", "XSA-222" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16hm-nyk9-5uff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4098?format=api", "vulnerability_id": "VCID-4s1w-v1qs-9uhp", "summary": "blkif responses leak backend stack data", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10911.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10911.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10911", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13689", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13778", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13637", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13709", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1372", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24002", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23951", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24165", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458870", "reference_id": "1458870", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458870" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869706", "reference_id": "869706", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=869706" }, { "reference_url": "https://usn.ubuntu.com/3414-1/", "reference_id": "USN-3414-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3414-1/" }, { "reference_url": "https://usn.ubuntu.com/3468-1/", "reference_id": "USN-3468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3468-1/" }, { "reference_url": "https://usn.ubuntu.com/3468-2/", "reference_id": "USN-3468-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3468-2/" }, { "reference_url": "https://usn.ubuntu.com/3468-3/", "reference_id": "USN-3468-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3468-3/" }, { "reference_url": "https://usn.ubuntu.com/3469-1/", "reference_id": "USN-3469-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3469-1/" }, { "reference_url": "https://usn.ubuntu.com/3469-2/", "reference_id": "USN-3469-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3469-2/" }, { "reference_url": "https://usn.ubuntu.com/3470-1/", "reference_id": "USN-3470-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3470-1/" }, { "reference_url": "https://usn.ubuntu.com/3470-2/", "reference_id": "USN-3470-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3470-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-216.html", "reference_id": "XSA-216", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-216.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10911", "XSA-216" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4s1w-v1qs-9uhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4107?format=api", "vulnerability_id": "VCID-4w49-gjvc-mqcy", "summary": "grant table operations mishandle reference counts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10920.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10920.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78357", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78391", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78316", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7836", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878", "reference_id": "1458878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-224.html", "reference_id": "XSA-224", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-224.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10920", "XSA-224" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4w49-gjvc-mqcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4110?format=api", "vulnerability_id": "VCID-dg8u-3vd1-27ef", "summary": "arm: vgic: Out-of-bound access when sending SGIs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10923.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10923.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10923", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.7364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73684", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73666", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73701", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73711", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73702", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73734", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00779", "scoring_system": "epss", "scoring_elements": "0.73743", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10923" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459515", "reference_id": "1459515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459515" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-225.html", "reference_id": "XSA-225", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-225.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10923", "XSA-225" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "6.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dg8u-3vd1-27ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4104?format=api", "vulnerability_id": "VCID-h8w2-rzzc-qqf5", "summary": "NULL pointer deref in event channel poll", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10917.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10917.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74651", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74774", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74732", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74767", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74655", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74681", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74656", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74688", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74726", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74706", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74697", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74735", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00839", "scoring_system": "epss", "scoring_elements": "0.74742", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:C" }, { "value": "7.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458875", "reference_id": "1458875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458875" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-221.html", "reference_id": "XSA-221", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-221.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10917", "XSA-221" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h8w2-rzzc-qqf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4099?format=api", "vulnerability_id": "VCID-mbv9-7v2m-4qf8", "summary": "page transfer may allow PV guest to elevate privilege", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10912.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10912.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82201", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.8219", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82135", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458871", "reference_id": "1458871", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458871" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-217.html", "reference_id": "XSA-217", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-217.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10912", "XSA-217" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbv9-7v2m-4qf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4102?format=api", "vulnerability_id": "VCID-nvk7-bptq-5ffh", "summary": "x86: insufficient reference counts during shadow emulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10915.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10915.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65545", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65689", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65662", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65677", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65659", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.6568", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458873", "reference_id": "1458873", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458873" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-219.html", "reference_id": "XSA-219", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-219.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10915", "XSA-219" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvk7-bptq-5ffh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4106?format=api", "vulnerability_id": "VCID-pd4h-ra44-gyb5", "summary": "ARM guest disabling interrupt may crash Xen", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10919.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10919.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10919", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71445", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71453", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.7147", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71443", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71483", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71518", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71529", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71534", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71513", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71564", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71571", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10919" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10919", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10919" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458877", "reference_id": "1458877", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458877" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-223.html", "reference_id": "XSA-223", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-223.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10919", "XSA-223" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "6.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pd4h-ra44-gyb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4101?format=api", "vulnerability_id": "VCID-what-pe1h-gfa7", "summary": "Races in the grant table unmap code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10914.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10914.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69495", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.6965", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.6959", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69568", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.6956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.696", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69609", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458872", "reference_id": "1458872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458872" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-218.html", "reference_id": "XSA-218", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-218.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10914", "XSA-218" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-what-pe1h-gfa7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4103?format=api", "vulnerability_id": "VCID-yahm-s7bt-akg6", "summary": "x86: PKRU and BND* leakage between vCPU-s", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10916.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10916.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10916", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60263", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60247", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6019", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6024", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60254", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60275", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60261", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60282", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10916" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10916", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10916" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:P" }, { "value": "5.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458874", "reference_id": "1458874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458874" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-220.html", "reference_id": "XSA-220", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-220.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/440499?format=api", "purl": "pkg:apk/alpine/xen@4.9.0-r0?arch=aarch64&distroversion=v3.20&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" } ], "aliases": [ "CVE-2017-10916", "XSA-220" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yahm-s7bt-akg6" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.9.0-r0%3Farch=aarch64&distroversion=v3.20&reponame=main" }