Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen@4.9.1-r1
Typeebuild
Namespaceapp-emulation
Namexen
Version4.9.1-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.10.1-r2
Latest_non_vulnerable_version4.17.4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-184d-4jsf-yqed
vulnerability_id VCID-184d-4jsf-yqed
summary improper bug check in x86 log-dirty handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17565.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17565.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17565
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20783
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20621
published_at 2026-04-24T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20766
published_at 2026-04-13T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20757
published_at 2026-04-16T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.2075
published_at 2026-04-18T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20737
published_at 2026-04-21T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20935
published_at 2026-04-02T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20993
published_at 2026-04-04T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20708
published_at 2026-04-07T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20785
published_at 2026-04-08T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20846
published_at 2026-04-09T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20862
published_at 2026-04-11T12:55:00Z
12
value 0.00067
scoring_system epss
scoring_elements 0.20819
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17565
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:P
1
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
9
reference_url https://support.citrix.com/article/CTX232096
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX232096
10
reference_url https://www.debian.org/security/2018/dsa-4112
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4112
11
reference_url http://www.openwall.com/lists/oss-security/2017/12/12/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/12/12/5
12
reference_url http://www.securityfocus.com/bid/102175
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102175
13
reference_url http://www.securitytracker.com/id/1040771
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040771
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518659
reference_id 1518659
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518659
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17565
reference_id CVE-2017-17565
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17565
17
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
18
reference_url https://xenbits.xen.org/xsa/advisory-251.html
reference_id XSA-251
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-251.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17565, XSA-251
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-184d-4jsf-yqed
1
url VCID-1xn5-2d9n-vuc4
vulnerability_id VCID-1xn5-2d9n-vuc4
summary Stale TLB entry due to page type release race
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15588.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15588
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23524
published_at 2026-04-01T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23339
published_at 2026-04-24T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23541
published_at 2026-04-13T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23553
published_at 2026-04-16T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23546
published_at 2026-04-18T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23525
published_at 2026-04-21T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23684
published_at 2026-04-02T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23726
published_at 2026-04-04T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23506
published_at 2026-04-07T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23577
published_at 2026-04-08T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23623
published_at 2026-04-09T12:55:00Z
11
value 0.0008
scoring_system epss
scoring_elements 0.23639
published_at 2026-04-11T12:55:00Z
12
value 0.0008
scoring_system epss
scoring_elements 0.23597
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
20
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
21
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
22
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
23
reference_url http://www.securityfocus.com/bid/101490
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101490
24
reference_url http://www.securitytracker.com/id/1039568
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039568
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499821
reference_id 1499821
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499821
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15588
reference_id CVE-2017-15588
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15588
28
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
29
reference_url https://xenbits.xen.org/xsa/advisory-241.html
reference_id XSA-241
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-241.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15588, XSA-241
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xn5-2d9n-vuc4
2
url VCID-21bx-skks-s7gc
vulnerability_id VCID-21bx-skks-s7gc
summary Missing p2m error checking in PoD code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17045.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17045
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21125
published_at 2026-04-01T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.20989
published_at 2026-04-24T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.2114
published_at 2026-04-18T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-21T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21277
published_at 2026-04-02T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21329
published_at 2026-04-04T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21081
published_at 2026-04-07T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21162
published_at 2026-04-08T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21222
published_at 2026-04-09T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21233
published_at 2026-04-11T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21191
published_at 2026-04-12T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21138
published_at 2026-04-13T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21131
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
19
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
20
reference_url https://support.citrix.com/article/CTX230138
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX230138
21
reference_url http://www.securityfocus.com/bid/102013
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102013
22
reference_url http://www.securityfocus.com/bid/102129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102129
23
reference_url http://www.securitytracker.com/id/1039879
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039879
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1513336
reference_id 1513336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1513336
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17045
reference_id CVE-2017-17045
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17045
27
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
28
reference_url https://xenbits.xen.org/xsa/advisory-247.html
reference_id XSA-247
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-247.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17045
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21bx-skks-s7gc
3
url VCID-6s1x-qtmr-jkg4
vulnerability_id VCID-6s1x-qtmr-jkg4
summary multiple MSI mapping issues on x86
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15590.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15590
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21666
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21528
published_at 2026-04-24T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21758
published_at 2026-04-12T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21701
published_at 2026-04-16T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21708
published_at 2026-04-18T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21677
published_at 2026-04-21T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21836
published_at 2026-04-02T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21889
published_at 2026-04-04T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21653
published_at 2026-04-07T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21729
published_at 2026-04-08T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21787
published_at 2026-04-09T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21798
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
20
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
21
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
22
reference_url http://www.securityfocus.com/bid/101500
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101500
23
reference_url http://www.securitytracker.com/id/1039568
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039568
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499817
reference_id 1499817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499817
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15590
reference_id CVE-2017-15590
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15590
27
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
28
reference_url https://xenbits.xen.org/xsa/advisory-237.html
reference_id XSA-237
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-237.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15590, XSA-237
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6s1x-qtmr-jkg4
4
url VCID-77vv-s9qz-9fft
vulnerability_id VCID-77vv-s9qz-9fft
summary x86: Incorrect handling of IST settings during CPU hotplug
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15594.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15594
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21975
published_at 2026-04-01T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21824
published_at 2026-04-24T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22017
published_at 2026-04-13T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22015
published_at 2026-04-16T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22009
published_at 2026-04-18T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21963
published_at 2026-04-21T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22132
published_at 2026-04-02T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22182
published_at 2026-04-04T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21965
published_at 2026-04-07T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-08T12:55:00Z
10
value 0.00072
scoring_system epss
scoring_elements 0.22102
published_at 2026-04-09T12:55:00Z
11
value 0.00072
scoring_system epss
scoring_elements 0.22119
published_at 2026-04-11T12:55:00Z
12
value 0.00072
scoring_system epss
scoring_elements 0.22078
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
20
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
21
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
22
reference_url http://www.securitytracker.com/id/1039568
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039568
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499824
reference_id 1499824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499824
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15594
reference_id CVE-2017-15594
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15594
26
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
27
reference_url https://xenbits.xen.org/xsa/advisory-244.html
reference_id XSA-244
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-244.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15594, XSA-244
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-77vv-s9qz-9fft
5
url VCID-7by4-vaak-5kdd
vulnerability_id VCID-7by4-vaak-5kdd
summary linux: Fix Xen block IO merge-ability calculation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12134.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12134.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12134
reference_id
reference_type
scores
0
value 0.00339
scoring_system epss
scoring_elements 0.56604
published_at 2026-04-01T12:55:00Z
1
value 0.00339
scoring_system epss
scoring_elements 0.56663
published_at 2026-04-24T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.5675
published_at 2026-04-18T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.56725
published_at 2026-04-21T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.567
published_at 2026-04-07T12:55:00Z
5
value 0.00339
scoring_system epss
scoring_elements 0.56721
published_at 2026-04-04T12:55:00Z
6
value 0.00339
scoring_system epss
scoring_elements 0.56752
published_at 2026-04-08T12:55:00Z
7
value 0.00339
scoring_system epss
scoring_elements 0.56757
published_at 2026-04-09T12:55:00Z
8
value 0.00339
scoring_system epss
scoring_elements 0.56766
published_at 2026-04-11T12:55:00Z
9
value 0.00339
scoring_system epss
scoring_elements 0.56743
published_at 2026-04-12T12:55:00Z
10
value 0.00339
scoring_system epss
scoring_elements 0.56722
published_at 2026-04-13T12:55:00Z
11
value 0.00339
scoring_system epss
scoring_elements 0.56753
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12134
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12134
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14156
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14340
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477656
reference_id 1477656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477656
20
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
21
reference_url https://usn.ubuntu.com/3444-1/
reference_id USN-3444-1
reference_type
scores
url https://usn.ubuntu.com/3444-1/
22
reference_url https://usn.ubuntu.com/3444-2/
reference_id USN-3444-2
reference_type
scores
url https://usn.ubuntu.com/3444-2/
23
reference_url https://usn.ubuntu.com/3655-1/
reference_id USN-3655-1
reference_type
scores
url https://usn.ubuntu.com/3655-1/
24
reference_url https://usn.ubuntu.com/3655-2/
reference_id USN-3655-2
reference_type
scores
url https://usn.ubuntu.com/3655-2/
25
reference_url https://xenbits.xen.org/xsa/advisory-229.html
reference_id XSA-229
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-229.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-12134
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7by4-vaak-5kdd
6
url VCID-86rr-juws-eya2
vulnerability_id VCID-86rr-juws-eya2
summary page type reference leak on x86
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15593.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15593.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15593
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22094
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21941
published_at 2026-04-24T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22133
published_at 2026-04-13T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22132
published_at 2026-04-16T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22127
published_at 2026-04-18T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22081
published_at 2026-04-21T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22247
published_at 2026-04-02T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22294
published_at 2026-04-04T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22078
published_at 2026-04-07T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22159
published_at 2026-04-08T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22214
published_at 2026-04-09T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22235
published_at 2026-04-11T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22194
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15593
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
20
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
21
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
22
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
23
reference_url http://www.securitytracker.com/id/1039568
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039568
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499822
reference_id 1499822
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499822
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15593
reference_id CVE-2017-15593
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15593
27
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
28
reference_url https://xenbits.xen.org/xsa/advisory-242.html
reference_id XSA-242
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-242.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15593, XSA-242
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86rr-juws-eya2
7
url VCID-adh2-ubyt-xyfu
vulnerability_id VCID-adh2-ubyt-xyfu
summary x86 PV guests may gain access to internally used pages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17566.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17566.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17566
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.2851
published_at 2026-04-01T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28286
published_at 2026-04-24T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28459
published_at 2026-04-13T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-16T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-18T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28401
published_at 2026-04-21T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28596
published_at 2026-04-02T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28639
published_at 2026-04-04T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28442
published_at 2026-04-07T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28509
published_at 2026-04-08T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28549
published_at 2026-04-09T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.2855
published_at 2026-04-11T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28508
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17566
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
9
reference_url https://support.citrix.com/article/CTX232096
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX232096
10
reference_url https://www.debian.org/security/2018/dsa-4112
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4112
11
reference_url http://www.openwall.com/lists/oss-security/2017/12/12/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/12/12/4
12
reference_url http://www.securityfocus.com/bid/102167
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102167
13
reference_url http://www.securitytracker.com/id/1040768
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040768
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518656
reference_id 1518656
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518656
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17566
reference_id CVE-2017-17566
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17566
17
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
18
reference_url https://xenbits.xen.org/xsa/advisory-248.html
reference_id XSA-248
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-248.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17566
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-adh2-ubyt-xyfu
8
url VCID-k8at-7tax-5ffr
vulnerability_id VCID-k8at-7tax-5ffr
summary hypervisor stack leak in x86 I/O intercept code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15589.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15589
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26284
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26038
published_at 2026-04-24T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26157
published_at 2026-04-13T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26161
published_at 2026-04-16T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26136
published_at 2026-04-18T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26098
published_at 2026-04-21T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26325
published_at 2026-04-02T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26365
published_at 2026-04-04T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26139
published_at 2026-04-07T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26206
published_at 2026-04-08T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26254
published_at 2026-04-09T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26261
published_at 2026-04-11T12:55:00Z
12
value 0.00094
scoring_system epss
scoring_elements 0.26215
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15589
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:N/A:N
1
value 3.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
20
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
21
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
22
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
23
reference_url http://www.securityfocus.com/bid/101496
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101496
24
reference_url http://www.securitytracker.com/id/1039568
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039568
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499819
reference_id 1499819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499819
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15589
reference_id CVE-2017-15589
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15589
28
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
29
reference_url https://xenbits.xen.org/xsa/advisory-239.html
reference_id XSA-239
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-239.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15589, XSA-239
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8at-7tax-5ffr
9
url VCID-n5nt-82va-kfeb
vulnerability_id VCID-n5nt-82va-kfeb
summary improper x86 shadow mode refcount error handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17564.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17564
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20011
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-24T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19996
published_at 2026-04-13T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19977
published_at 2026-04-16T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.1998
published_at 2026-04-18T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19976
published_at 2026-04-21T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20159
published_at 2026-04-02T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20218
published_at 2026-04-04T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19944
published_at 2026-04-07T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.20024
published_at 2026-04-08T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.20083
published_at 2026-04-09T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.20098
published_at 2026-04-11T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.20053
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17564
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
9
reference_url https://support.citrix.com/article/CTX232096
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX232096
10
reference_url https://www.debian.org/security/2018/dsa-4112
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4112
11
reference_url http://www.openwall.com/lists/oss-security/2017/12/12/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/12/12/3
12
reference_url http://www.securityfocus.com/bid/102172
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102172
13
reference_url http://www.securitytracker.com/id/1040770
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040770
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518658
reference_id 1518658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518658
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17564
reference_id CVE-2017-17564
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17564
17
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
18
reference_url https://xenbits.xen.org/xsa/advisory-250.html
reference_id XSA-250
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-250.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17564
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n5nt-82va-kfeb
10
url VCID-p3jn-mvy5-gkgw
vulnerability_id VCID-p3jn-mvy5-gkgw
summary broken x86 shadow mode refcount overflow check
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17563.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17563.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17563
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20011
published_at 2026-04-01T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19866
published_at 2026-04-24T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19996
published_at 2026-04-13T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19977
published_at 2026-04-16T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.1998
published_at 2026-04-18T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19976
published_at 2026-04-21T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20159
published_at 2026-04-02T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20218
published_at 2026-04-04T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19944
published_at 2026-04-07T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.20024
published_at 2026-04-08T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.20083
published_at 2026-04-09T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.20098
published_at 2026-04-11T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.20053
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17563
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
8
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
9
reference_url https://support.citrix.com/article/CTX232096
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX232096
10
reference_url https://www.debian.org/security/2018/dsa-4112
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4112
11
reference_url http://www.openwall.com/lists/oss-security/2017/12/12/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/12/12/2
12
reference_url http://www.securityfocus.com/bid/102169
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102169
13
reference_url http://www.securitytracker.com/id/1040769
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040769
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1518657
reference_id 1518657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1518657
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17563
reference_id CVE-2017-17563
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17563
17
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
18
reference_url https://xenbits.xen.org/xsa/advisory-249.html
reference_id XSA-249
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-249.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17563
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3jn-mvy5-gkgw
11
url VCID-qawr-2f43-4yeg
vulnerability_id VCID-qawr-2f43-4yeg
summary x86: infinite loop due to missing PoD error checking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17044.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17044
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15879
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15817
published_at 2026-04-24T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15821
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15744
published_at 2026-04-16T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15753
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15796
published_at 2026-04-21T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.1594
published_at 2026-04-02T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16003
published_at 2026-04-04T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15802
published_at 2026-04-07T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15888
published_at 2026-04-08T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15951
published_at 2026-04-09T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15927
published_at 2026-04-11T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15889
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html
20
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
21
reference_url https://support.citrix.com/article/CTX230138
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX230138
22
reference_url http://www.securityfocus.com/bid/102008
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102008
23
reference_url http://www.securityfocus.com/bid/102129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102129
24
reference_url http://www.securityfocus.com/bid/105954
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/105954
25
reference_url http://www.securitytracker.com/id/1039878
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039878
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1513335
reference_id 1513335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1513335
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17044
reference_id CVE-2017-17044
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-17044
29
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
30
reference_url https://xenbits.xen.org/xsa/advisory-246.html
reference_id XSA-246
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-246.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17044
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qawr-2f43-4yeg
12
url VCID-tvgp-a9ud-mfgt
vulnerability_id VCID-tvgp-a9ud-mfgt
summary grant_table: Race conditions with maptrack free list handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12136.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12136.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12136
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04868
published_at 2026-04-24T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06798
published_at 2026-04-21T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16591
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16654
published_at 2026-04-04T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16453
published_at 2026-04-07T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16539
published_at 2026-04-08T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16594
published_at 2026-04-09T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16574
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16534
published_at 2026-04-12T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16476
published_at 2026-04-13T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16416
published_at 2026-04-16T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16437
published_at 2026-04-18T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.1641
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12136
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477651
reference_id 1477651
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477651
5
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
6
reference_url https://xenbits.xen.org/xsa/advisory-228.html
reference_id XSA-228
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-228.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-12136, XSA-228
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvgp-a9ud-mfgt
13
url VCID-twnq-fujf-d7fs
vulnerability_id VCID-twnq-fujf-d7fs
summary ARM: Some memory not scrubbed at boot
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17046.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17046.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-17046
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17815
published_at 2026-04-01T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17706
published_at 2026-04-24T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17759
published_at 2026-04-18T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17797
published_at 2026-04-21T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17978
published_at 2026-04-02T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18033
published_at 2026-04-04T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17734
published_at 2026-04-07T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17821
published_at 2026-04-08T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17883
published_at 2026-04-09T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17898
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17854
published_at 2026-04-12T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17806
published_at 2026-04-13T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17749
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-17046
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499825
reference_id 1499825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499825
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-17046
reference_id CVE-2017-17046
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-17046
22
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
23
reference_url https://xenbits.xen.org/xsa/advisory-245.html
reference_id XSA-245
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-245.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-17046, XSA-245
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-twnq-fujf-d7fs
14
url VCID-umyp-nvd9-b7b9
vulnerability_id VCID-umyp-nvd9-b7b9
summary DMOP map/unmap missing argument checks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15591.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15591.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15591
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.16023
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.1597
published_at 2026-04-24T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16086
published_at 2026-04-13T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.16019
published_at 2026-04-16T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.16034
published_at 2026-04-18T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.16074
published_at 2026-04-21T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.16205
published_at 2026-04-02T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.16266
published_at 2026-04-04T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.1606
published_at 2026-04-07T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16145
published_at 2026-04-08T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.16209
published_at 2026-04-09T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.16193
published_at 2026-04-11T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.16154
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15591
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:C
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499818
reference_id 1499818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499818
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.7.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.8.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.8.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.9.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15591
reference_id CVE-2017-15591
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15591
39
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
40
reference_url https://xenbits.xen.org/xsa/advisory-238.html
reference_id XSA-238
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-238.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15591
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-umyp-nvd9-b7b9
15
url VCID-vm3z-k775-gqax
vulnerability_id VCID-vm3z-k775-gqax
summary Unlimited recursion in linear pagetable de-typing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15595.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15595
reference_id
reference_type
scores
0
value 0.00461
scoring_system epss
scoring_elements 0.64214
published_at 2026-04-24T12:55:00Z
1
value 0.00461
scoring_system epss
scoring_elements 0.64186
published_at 2026-04-09T12:55:00Z
2
value 0.00461
scoring_system epss
scoring_elements 0.64199
published_at 2026-04-11T12:55:00Z
3
value 0.00461
scoring_system epss
scoring_elements 0.64188
published_at 2026-04-12T12:55:00Z
4
value 0.00461
scoring_system epss
scoring_elements 0.64159
published_at 2026-04-13T12:55:00Z
5
value 0.00461
scoring_system epss
scoring_elements 0.64195
published_at 2026-04-16T12:55:00Z
6
value 0.00461
scoring_system epss
scoring_elements 0.64206
published_at 2026-04-18T12:55:00Z
7
value 0.00461
scoring_system epss
scoring_elements 0.64194
published_at 2026-04-21T12:55:00Z
8
value 0.00461
scoring_system epss
scoring_elements 0.64119
published_at 2026-04-07T12:55:00Z
9
value 0.00461
scoring_system epss
scoring_elements 0.6417
published_at 2026-04-08T12:55:00Z
10
value 0.00675
scoring_system epss
scoring_elements 0.71397
published_at 2026-04-02T12:55:00Z
11
value 0.00675
scoring_system epss
scoring_elements 0.71389
published_at 2026-04-01T12:55:00Z
12
value 0.00675
scoring_system epss
scoring_elements 0.71415
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
20
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
21
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
22
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
23
reference_url https://www.exploit-db.com/exploits/43014/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/43014/
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499820
reference_id 1499820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499820
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
26
reference_url https://bugs.chromium.org/p/project-zero/issues/detail?id=1359
reference_id CVE-2017-15595
reference_type exploit
scores
url https://bugs.chromium.org/p/project-zero/issues/detail?id=1359
27
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/43014.txt
reference_id CVE-2017-15595
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/43014.txt
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15595
reference_id CVE-2017-15595
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15595
29
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
30
reference_url https://xenbits.xen.org/xsa/advisory-240.html
reference_id XSA-240
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-240.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15595, XSA-240
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vm3z-k775-gqax
16
url VCID-wjcc-bpcz-a3ee
vulnerability_id VCID-wjcc-bpcz-a3ee
summary x86: Incorrect handling of self-linear shadow mappings with translated guests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15592.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15592
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.2851
published_at 2026-04-01T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28286
published_at 2026-04-24T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28459
published_at 2026-04-13T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28474
published_at 2026-04-16T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-18T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28401
published_at 2026-04-21T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28596
published_at 2026-04-02T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28639
published_at 2026-04-04T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28442
published_at 2026-04-07T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28509
published_at 2026-04-08T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28549
published_at 2026-04-09T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.2855
published_at 2026-04-11T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28508
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14317
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14318
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14319
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15588
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15589
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15590
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15591
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15592
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15593
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15594
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15597
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17046
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html
20
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
21
reference_url https://support.citrix.com/article/CTX228867
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX228867
22
reference_url https://support.citrix.com/article/CTX230138
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX230138
23
reference_url https://www.debian.org/security/2017/dsa-4050
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4050
24
reference_url http://www.securityfocus.com/bid/101513
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101513
25
reference_url http://www.securityfocus.com/bid/102129
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102129
26
reference_url http://www.securitytracker.com/id/1039568
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039568
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1499823
reference_id 1499823
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1499823
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15592
reference_id CVE-2017-15592
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15592
30
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
31
reference_url https://xenbits.xen.org/xsa/advisory-243.html
reference_id XSA-243
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-243.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-15592, XSA-243
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjcc-bpcz-a3ee
17
url VCID-xef9-czpm-y7e7
vulnerability_id VCID-xef9-czpm-y7e7
summary multiple problems with transitive grants
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12135.json
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12135
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20379
published_at 2026-04-24T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20494
published_at 2026-04-21T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31833
published_at 2026-04-01T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31962
published_at 2026-04-02T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.32004
published_at 2026-04-04T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31824
published_at 2026-04-07T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31877
published_at 2026-04-08T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31905
published_at 2026-04-09T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31909
published_at 2026-04-11T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.3187
published_at 2026-04-12T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31835
published_at 2026-04-13T12:55:00Z
11
value 0.00126
scoring_system epss
scoring_elements 0.31867
published_at 2026-04-16T12:55:00Z
12
value 0.00126
scoring_system epss
scoring_elements 0.31848
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:C
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477655
reference_id 1477655
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477655
17
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
18
reference_url https://xenbits.xen.org/xsa/advisory-226.html
reference_id XSA-226
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-226.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-12135, XSA-226
risk_score 3.6
exploitability 0.5
weighted_severity 7.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xef9-czpm-y7e7
18
url VCID-ycv1-t5bt-zqhj
vulnerability_id VCID-ycv1-t5bt-zqhj
summary x86: PV privilege escalation via map_grant_ref
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12137.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12137.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12137
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10013
published_at 2026-04-24T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.13989
published_at 2026-04-21T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.2721
published_at 2026-04-02T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27247
published_at 2026-04-04T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-07T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.27109
published_at 2026-04-08T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27155
published_at 2026-04-09T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.2716
published_at 2026-04-11T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27117
published_at 2026-04-12T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27059
published_at 2026-04-13T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27068
published_at 2026-04-16T12:55:00Z
11
value 0.00099
scoring_system epss
scoring_elements 0.27042
published_at 2026-04-18T12:55:00Z
12
value 0.00099
scoring_system epss
scoring_elements 0.2717
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12137
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477657
reference_id 1477657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477657
17
reference_url https://security.gentoo.org/glsa/201801-14
reference_id GLSA-201801-14
reference_type
scores
url https://security.gentoo.org/glsa/201801-14
18
reference_url https://xenbits.xen.org/xsa/advisory-227.html
reference_id XSA-227
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-227.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.9.1-r1
purl pkg:ebuild/app-emulation/xen@4.9.1-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1
aliases CVE-2017-12137, XSA-227
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycv1-t5bt-zqhj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.9.1-r1