Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
Typeebuild
Namespaceapp-emulation
Namexen-pvgrub
Version4.2.2-r3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.6.0
Latest_non_vulnerable_version4.7.3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-21e6-1c41-1ban
vulnerability_id VCID-21e6-1c41-1ban
summary Timer overflow DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html
8
reference_url http://osvdb.org/87298
reference_id
reference_type
scores
url http://osvdb.org/87298
9
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4535.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4535.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4535
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.2864
published_at 2026-04-16T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28667
published_at 2026-04-01T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28752
published_at 2026-04-02T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28799
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28606
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28671
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28712
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28669
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28621
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535
13
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
14
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
15
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
16
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
17
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
18
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
19
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80022
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80022
21
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
22
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/1
23
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
24
reference_url http://www.securitytracker.com/id?1027759
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027759
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870086
reference_id 870086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870086
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4535
reference_id CVE-2012-4535
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4535
42
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
43
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
44
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
45
reference_url https://xenbits.xen.org/xsa/advisory-20.html
reference_id XSA-20
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-20.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-4535
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21e6-1c41-1ban
1
url VCID-2534-cu4k-x3fs
vulnerability_id VCID-2534-cu4k-x3fs
summary XENMEM_exchange may overwrite hypervisor memory
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5513.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5513
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34537
published_at 2026-04-16T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34257
published_at 2026-04-01T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34596
published_at 2026-04-02T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34622
published_at 2026-04-04T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34489
published_at 2026-04-07T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34531
published_at 2026-04-08T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34561
published_at 2026-04-09T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34563
published_at 2026-04-11T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34524
published_at 2026-04-12T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.345
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5513
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513
13
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
14
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
15
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
16
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
17
reference_url http://secunia.com/advisories/51495
reference_id
reference_type
scores
url http://secunia.com/advisories/51495
18
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
19
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80482
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80482
21
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
22
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
23
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/11
24
reference_url http://www.osvdb.org/88131
reference_id
reference_type
scores
url http://www.osvdb.org/88131
25
reference_url http://www.securityfocus.com/bid/56797
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56797
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877391
reference_id 877391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877391
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5513
reference_id CVE-2012-5513
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5513
55
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
56
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
57
reference_url https://xenbits.xen.org/xsa/advisory-29.html
reference_id XSA-29
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-29.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5513
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2534-cu4k-x3fs
2
url VCID-2q8z-7gt6-j3a7
vulnerability_id VCID-2q8z-7gt6-j3a7
summary 64-bit PV guest privilege escalation vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0217.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0217
reference_id
reference_type
scores
0
value 0.88004
scoring_system epss
scoring_elements 0.99476
published_at 2026-04-02T12:55:00Z
1
value 0.88004
scoring_system epss
scoring_elements 0.99478
published_at 2026-04-04T12:55:00Z
2
value 0.88004
scoring_system epss
scoring_elements 0.99479
published_at 2026-04-07T12:55:00Z
3
value 0.88004
scoring_system epss
scoring_elements 0.99481
published_at 2026-04-09T12:55:00Z
4
value 0.88004
scoring_system epss
scoring_elements 0.99482
published_at 2026-04-13T12:55:00Z
5
value 0.88004
scoring_system epss
scoring_elements 0.99484
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0217
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=813428
reference_id 813428
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=813428
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd_x86-64/local/46508.rb
reference_id CVE-2012-0217
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd_x86-64/local/46508.rb
5
reference_url https://raw.githubusercontent.com/rapid7/metasploit-framework/468679f9074ee4a7de7624d3440ff6e7f65cf9c2/modules/exploits/freebsd/local/intel_sysret_priv_esc.rb
reference_id CVE-2012-0217
reference_type exploit
scores
url https://raw.githubusercontent.com/rapid7/metasploit-framework/468679f9074ee4a7de7624d3440ff6e7f65cf9c2/modules/exploits/freebsd/local/intel_sysret_priv_esc.rb
6
reference_url http://packetstormsecurity.org/files/115908/sysret.rar
reference_id CVE-2012-0217;OSVDB-82850;MS12-042
reference_type exploit
scores
url http://packetstormsecurity.org/files/115908/sysret.rar
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/20861.txt
reference_id CVE-2012-0217;OSVDB-82850;MS12-042
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/20861.txt
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/local/28718.c
reference_id CVE-2012-0217;OSVDB-82949
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/freebsd/local/28718.c
9
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
10
reference_url https://access.redhat.com/errata/RHSA-2012:0720
reference_id RHSA-2012:0720
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0720
11
reference_url https://access.redhat.com/errata/RHSA-2012:0721
reference_id RHSA-2012:0721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0721
12
reference_url https://xenbits.xen.org/xsa/advisory-7.html
reference_id XSA-7
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-7.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-0217
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2q8z-7gt6-j3a7
3
url VCID-33gz-5ke6-zqdn
vulnerability_id VCID-33gz-5ke6-zqdn
summary Several memory hypercall operations allow invalid extent order values
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
9
reference_url http://lists.xen.org/archives/html/xen-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-12/msg00001.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5515.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5515.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5515
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.34323
published_at 2026-04-16T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34043
published_at 2026-04-01T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34381
published_at 2026-04-02T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34409
published_at 2026-04-04T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34276
published_at 2026-04-07T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.3432
published_at 2026-04-08T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.3435
published_at 2026-04-09T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34351
published_at 2026-04-11T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34311
published_at 2026-04-12T12:55:00Z
9
value 0.00141
scoring_system epss
scoring_elements 0.34287
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5515
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515
13
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
14
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
15
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
16
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
17
reference_url http://secunia.com/advisories/51495
reference_id
reference_type
scores
url http://secunia.com/advisories/51495
18
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
19
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80479
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80479
21
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
22
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
23
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/9
24
reference_url http://www.osvdb.org/88127
reference_id
reference_type
scores
url http://www.osvdb.org/88127
25
reference_url http://www.securityfocus.com/bid/56798
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56798
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877397
reference_id 877397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877397
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5515
reference_id CVE-2012-5515
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5515
55
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
56
reference_url https://access.redhat.com/errata/RHSA-2013:0168
reference_id RHSA-2013:0168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0168
57
reference_url https://xenbits.xen.org/xsa/advisory-31.html
reference_id XSA-31
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-31.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5515
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33gz-5ke6-zqdn
4
url VCID-3ead-rt5y-p3fw
vulnerability_id VCID-3ead-rt5y-p3fw
summary Broken error handling in guest_physmap_mark_populate_on_demand()
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5514.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5514.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5514
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21306
published_at 2026-04-16T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21293
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21449
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21502
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21254
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21334
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21395
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21404
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21364
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21311
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5514
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514
10
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
11
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
12
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
13
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
14
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
15
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80483
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80483
17
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
18
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
19
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/12
20
reference_url http://www.osvdb.org/88130
reference_id
reference_type
scores
url http://www.osvdb.org/88130
21
reference_url http://www.securityfocus.com/bid/56803
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56803
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877393
reference_id 877393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877393
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5514
reference_id CVE-2012-5514
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5514
51
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
52
reference_url https://xenbits.xen.org/xsa/advisory-30.html
reference_id XSA-30
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-30.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5514
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ead-rt5y-p3fw
5
url VCID-3q19-6ynd-6kb1
vulnerability_id VCID-3q19-6ynd-6kb1
summary nested virtualization on 32-bit exposes host crash
references
0
reference_url http://openwall.com/lists/oss-security/2013/01/22/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/01/22/10
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0151.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0151
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32042
published_at 2026-04-16T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32006
published_at 2026-04-01T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32133
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32172
published_at 2026-04-04T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.31995
published_at 2026-04-07T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32046
published_at 2026-04-08T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32075
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32079
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.3204
published_at 2026-04-12T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32008
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0151
3
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
4
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
5
reference_url http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=d60d7082289a74e44b3dc8f67df46c3404ca08bf
reference_id
reference_type
scores
url http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=d60d7082289a74e44b3dc8f67df46c3404ca08bf
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=893144
reference_id 893144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=893144
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.2.1:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:-:*:*:*:*:x86:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0151
reference_id CVE-2013-0151
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:A/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0151
10
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
11
reference_url https://xenbits.xen.org/xsa/advisory-34.html
reference_id XSA-34
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-34.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-0151
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3q19-6ynd-6kb1
6
url VCID-4ccg-4xa6-syak
vulnerability_id VCID-4ccg-4xa6-syak
summary several HVM operations do not validate the range of their inputs
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6333.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6333.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6333
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21503
published_at 2026-04-16T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21473
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21643
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.217
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21454
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21531
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21589
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21601
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21563
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21506
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6333
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6333
5
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
6
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
7
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
8
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
9
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
11
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
12
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/10
13
reference_url http://www.osvdb.org/88129
reference_id
reference_type
scores
url http://www.osvdb.org/88129
14
reference_url http://www.securityfocus.com/bid/56796
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56796
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877365
reference_id 877365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877365
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6333
reference_id CVE-2012-6333
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6333
29
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
30
reference_url https://xenbits.xen.org/xsa/advisory-27.html
reference_id XSA-27
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-27.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-6333
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ccg-4xa6-syak
7
url VCID-4s4d-gnst-1qhw
vulnerability_id VCID-4s4d-gnst-1qhw
summary multiple TMEM hypercall vulnerabilities
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
6
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3497.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3497
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28831
published_at 2026-04-16T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28855
published_at 2026-04-08T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28931
published_at 2026-04-02T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28981
published_at 2026-04-04T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28787
published_at 2026-04-07T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28896
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28902
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28858
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3497
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497
10
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
11
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
12
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
13
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
14
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
15
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
17
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
19
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
20
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3497
reference_id CVE-2012-3497
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3497
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
28
reference_url https://xenbits.xen.org/xsa/advisory-15.html
reference_id XSA-15
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-15.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-3497
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4s4d-gnst-1qhw
8
url VCID-4xug-22db-7qg2
vulnerability_id VCID-4xug-22db-7qg2
summary Potential use of freed memory in event channel operations
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
4
reference_url http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
5
reference_url http://osvdb.org/92050
reference_id
reference_type
scores
url http://osvdb.org/92050
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1920.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1920.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1920
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19744
published_at 2026-04-16T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19799
published_at 2026-04-01T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19945
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20002
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.1973
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19809
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19862
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19871
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19827
published_at 2026-04-12T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.1977
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1920
8
reference_url http://secunia.com/advisories/52857
reference_id
reference_type
scores
url http://secunia.com/advisories/52857
9
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
10
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/83226
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/83226
12
reference_url http://www.openwall.com/lists/oss-security/2013/04/04/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/04/7
13
reference_url http://www.securityfocus.com/bid/58880
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58880
14
reference_url http://www.securitytracker.com/id/1028388
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028388
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=950097
reference_id 950097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=950097
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1920
reference_id CVE-2013-1920
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1920
46
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
47
reference_url https://xenbits.xen.org/xsa/advisory-47.html
reference_id XSA-47
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-47.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1920
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4xug-22db-7qg2
9
url VCID-55n8-eqfw-m3gd
vulnerability_id VCID-55n8-eqfw-m3gd
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6030.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6030.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6030
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18314
published_at 2026-04-16T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18426
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18571
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18626
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18334
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18417
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18469
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18421
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6030
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6030
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6030
reference_id CVE-2012-6030
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6030
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6030
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55n8-eqfw-m3gd
10
url VCID-5aus-m6c9-k7f7
vulnerability_id VCID-5aus-m6c9-k7f7
summary Multiple vulnerabilities in libelf PV kernel handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2195.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2195
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11831
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11946
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11992
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11784
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11867
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1192
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11928
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11888
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11861
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11727
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2195
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=970631
reference_id 970631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=970631
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-55.html
reference_id XSA-55
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-55.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2195
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5aus-m6c9-k7f7
11
url VCID-5jsd-ps57-fyde
vulnerability_id VCID-5jsd-ps57-fyde
summary Several access permission issues with IRQs for unprivileged guests
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104538.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104538.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1919.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1919.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1919
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.2651
published_at 2026-04-16T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26609
published_at 2026-04-01T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26655
published_at 2026-04-02T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26699
published_at 2026-04-04T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26484
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26553
published_at 2026-04-08T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26601
published_at 2026-04-09T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26607
published_at 2026-04-11T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26562
published_at 2026-04-12T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26504
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1919
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919
7
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
8
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
9
reference_url http://www.debian.org/security/2013/dsa-2662
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2662
10
reference_url http://www.openwall.com/lists/oss-security/2013/04/18/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/18/6
11
reference_url http://www.securityfocus.com/bid/59292
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59292
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=950686
reference_id 950686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=950686
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1919
reference_id CVE-2013-1919
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1919
23
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
24
reference_url https://xenbits.xen.org/xsa/advisory-46.html
reference_id XSA-46
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-46.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1919
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jsd-ps57-fyde
12
url VCID-5x39-ttxq-aygg
vulnerability_id VCID-5x39-ttxq-aygg
summary oxenstored incorrect handling of certain Xenbus ring states
references
0
reference_url http://openwall.com/lists/oss-security/2013/02/05/10
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/10
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0215.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0215.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0215
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.2921
published_at 2026-04-16T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29237
published_at 2026-04-01T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29311
published_at 2026-04-02T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.2936
published_at 2026-04-04T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29172
published_at 2026-04-07T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29236
published_at 2026-04-12T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29276
published_at 2026-04-09T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29282
published_at 2026-04-11T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29183
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0215
3
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
4
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
5
reference_url http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=40f9c5e0a6d15b4ca1f6d4ed3a46f0871520eab5
reference_id
reference_type
scores
url http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=40f9c5e0a6d15b4ca1f6d4ed3a46f0871520eab5
6
reference_url http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=61401264eb00fae4ee4efc8e9a5067449283207b
reference_id
reference_type
scores
url http://xenbits.xen.org/gitweb/?p=xen.git%3Ba=commit%3Bh=61401264eb00fae4ee4efc8e9a5067449283207b
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=906323
reference_id 906323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=906323
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0215
reference_id CVE-2013-0215
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0215
16
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
17
reference_url https://xenbits.xen.org/xsa/advisory-38.html
reference_id XSA-38
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-38.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-0215
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x39-ttxq-aygg
13
url VCID-6tn5-hymv-3ffj
vulnerability_id VCID-6tn5-hymv-3ffj
summary Xen PV DoS vulnerability with SYSENTER
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1917.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1917.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1917
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22478
published_at 2026-04-16T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22407
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22575
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22618
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22404
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22485
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.2254
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22558
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22517
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22462
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1917
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917
8
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
9
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
10
reference_url http://www.debian.org/security/2012/dsa-2662
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2662
11
reference_url http://www.openwall.com/lists/oss-security/2013/04/18/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/18/8
12
reference_url http://www.securitytracker.com/id/1028455
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028455
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=950668
reference_id 950668
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=950668
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1917
reference_id CVE-2013-1917
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1917
42
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
43
reference_url https://xenbits.xen.org/xsa/advisory-44.html
reference_id XSA-44
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-44.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1917
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tn5-hymv-3ffj
14
url VCID-7tzw-mz63-rucy
vulnerability_id VCID-7tzw-mz63-rucy
summary Hypervisor crash due to missing exception recovery on XRSTOR
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2077.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2077
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30841
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30967
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31015
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30833
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30891
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30923
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.3088
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30836
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30867
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2077
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=964261
reference_id 964261
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=964261
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-53.html
reference_id XSA-53
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-53.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2077
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7tzw-mz63-rucy
15
url VCID-9hbw-uh8q-1uex
vulnerability_id VCID-9hbw-uh8q-1uex
summary hypercall set_debugreg vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
9
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html
10
reference_url http://osvdb.org/85197
reference_id
reference_type
scores
url http://osvdb.org/85197
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3494.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3494
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29605
published_at 2026-04-16T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29642
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.2976
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29579
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29641
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29679
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29681
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29637
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29586
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3494
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494
14
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
15
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
16
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
17
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
18
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78265
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78265
20
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
21
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-12_hypercall_set_debugreg_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-12_hypercall_set_debugreg_vulnerability
22
reference_url http://www.debian.org/security/2012/dsa-2544
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2544
23
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/5
24
reference_url http://www.securityfocus.com/bid/55400
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55400
25
reference_url http://www.securitytracker.com/id?1027479
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027479
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851139
reference_id 851139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851139
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*
reference_id cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*
reference_id cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3494
reference_id CVE-2012-3494
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3494
37
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
38
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
39
reference_url https://xenbits.xen.org/xsa/advisory-12.html
reference_id XSA-12
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-12.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-3494
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hbw-uh8q-1uex
16
url VCID-as1n-dj7c-63gh
vulnerability_id VCID-as1n-dj7c-63gh
summary Hypervisor crash due to missing exception recovery on XSETBV
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2078.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2078
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.1728
published_at 2026-04-01T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17448
published_at 2026-04-02T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17494
published_at 2026-04-04T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17275
published_at 2026-04-07T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17367
published_at 2026-04-08T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17426
published_at 2026-04-09T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17439
published_at 2026-04-11T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17391
published_at 2026-04-12T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17336
published_at 2026-04-13T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17277
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2078
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=964264
reference_id 964264
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=964264
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-54.html
reference_id XSA-54
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-54.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2078
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-as1n-dj7c-63gh
17
url VCID-bhws-bgg4-m3bn
vulnerability_id VCID-bhws-bgg4-m3bn
summary PHYSDEVOP_map_pirq index vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00005.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00005.html
6
reference_url http://osvdb.org/85198
reference_id
reference_type
scores
url http://osvdb.org/85198
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3498.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3498
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20829
published_at 2026-04-16T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-01T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21006
published_at 2026-04-02T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21062
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20777
published_at 2026-04-07T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20857
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20935
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20891
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20839
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498
10
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
11
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
12
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
13
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
14
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
15
reference_url http://securitytracker.com/id?1027483
reference_id
reference_type
scores
url http://securitytracker.com/id?1027483
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78269
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78269
17
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
18
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-16_PHYSDEVOP_map_pirq_index_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-16_PHYSDEVOP_map_pirq_index_vulnerability
19
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/9
20
reference_url http://www.securityfocus.com/bid/55414
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55414
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851193
reference_id 851193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851193
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3498
reference_id CVE-2012-3498
reference_type
scores
0
value 5.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3498
27
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
28
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
29
reference_url https://xenbits.xen.org/xsa/advisory-16.html
reference_id XSA-16
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-16.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-3498
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhws-bgg4-m3bn
18
url VCID-bz27-8gdr-xue7
vulnerability_id VCID-bz27-8gdr-xue7
summary Qemu VT100 emulation vulnerability
references
0
reference_url http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html
16
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2012-1233.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1233.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2012-1234.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1234.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2012-1235.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1235.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2012-1236.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1236.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2012-1262.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1262.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2012-1325.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1325.html
23
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3515.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3515.json
24
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3515
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31334
published_at 2026-04-16T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31294
published_at 2026-04-07T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31434
published_at 2026-04-02T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31476
published_at 2026-04-04T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31347
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31378
published_at 2026-04-09T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31382
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31338
published_at 2026-04-12T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.313
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3515
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515
26
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
27
reference_url http://secunia.com/advisories/50528
reference_id
reference_type
scores
url http://secunia.com/advisories/50528
28
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
29
reference_url http://secunia.com/advisories/50632
reference_id
reference_type
scores
url http://secunia.com/advisories/50632
30
reference_url http://secunia.com/advisories/50689
reference_id
reference_type
scores
url http://secunia.com/advisories/50689
31
reference_url http://secunia.com/advisories/50860
reference_id
reference_type
scores
url http://secunia.com/advisories/50860
32
reference_url http://secunia.com/advisories/50913
reference_id
reference_type
scores
url http://secunia.com/advisories/50913
33
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
34
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
35
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
36
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
37
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability
38
reference_url http://www.debian.org/security/2012/dsa-2543
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2543
39
reference_url http://www.debian.org/security/2012/dsa-2545
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2545
40
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/10
41
reference_url http://www.securityfocus.com/bid/55413
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55413
42
reference_url http://www.ubuntu.com/usn/USN-1590-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1590-1
43
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851252
reference_id 851252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851252
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3515
reference_id CVE-2012-3515
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3515
79
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
80
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
81
reference_url https://access.redhat.com/errata/RHSA-2012:1233
reference_id RHSA-2012:1233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1233
82
reference_url https://access.redhat.com/errata/RHSA-2012:1234
reference_id RHSA-2012:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1234
83
reference_url https://access.redhat.com/errata/RHSA-2012:1235
reference_id RHSA-2012:1235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1235
84
reference_url https://access.redhat.com/errata/RHSA-2012:1236
reference_id RHSA-2012:1236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1236
85
reference_url https://access.redhat.com/errata/RHSA-2012:1325
reference_id RHSA-2012:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1325
86
reference_url https://usn.ubuntu.com/1590-1/
reference_id USN-1590-1
reference_type
scores
url https://usn.ubuntu.com/1590-1/
87
reference_url https://xenbits.xen.org/xsa/advisory-17.html
reference_id XSA-17
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-17.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-3515
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz27-8gdr-xue7
19
url VCID-c2h3-cujg-77fp
vulnerability_id VCID-c2h3-cujg-77fp
summary Page reference counting error due to XSA-45/CVE-2013-1918 fixes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1432
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.6121
published_at 2026-04-01T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.6129
published_at 2026-04-02T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61318
published_at 2026-04-04T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61287
published_at 2026-04-07T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61334
published_at 2026-04-08T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61349
published_at 2026-04-09T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.6137
published_at 2026-04-11T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61355
published_at 2026-04-12T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61337
published_at 2026-04-13T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.61375
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=974250
reference_id 974250
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=974250
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-58.html
reference_id XSA-58
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-58.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1432
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2h3-cujg-77fp
20
url VCID-cgf9-wy2g-y3eg
vulnerability_id VCID-cgf9-wy2g-y3eg
summary Grant table version switch list corruption vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5510.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5510.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5510
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25879
published_at 2026-04-16T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25958
published_at 2026-04-01T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26041
published_at 2026-04-02T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.26083
published_at 2026-04-04T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25848
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.2597
published_at 2026-04-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.2598
published_at 2026-04-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25935
published_at 2026-04-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25876
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5510
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510
10
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
11
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
12
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
13
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
14
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
15
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80478
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80478
17
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
18
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
19
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/6
20
reference_url http://www.osvdb.org/88128
reference_id
reference_type
scores
url http://www.osvdb.org/88128
21
reference_url http://www.securityfocus.com/bid/56794
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56794
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877358
reference_id 877358
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877358
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5510
reference_id CVE-2012-5510
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5510
34
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
35
reference_url https://xenbits.xen.org/xsa/advisory-26.html
reference_id XSA-26
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-26.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5510
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgf9-wy2g-y3eg
21
url VCID-d482-9v57-dyg3
vulnerability_id VCID-d482-9v57-dyg3
summary HVM guest destroy p2m teardown host DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
4
reference_url http://lists.xen.org/archives/html/xen-devel/2012-08/msg00855.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-devel/2012-08/msg00855.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3433.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3433.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3433
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.2258
published_at 2026-04-16T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22507
published_at 2026-04-01T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22681
published_at 2026-04-02T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22725
published_at 2026-04-04T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22514
published_at 2026-04-07T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22591
published_at 2026-04-08T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22646
published_at 2026-04-09T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22663
published_at 2026-04-11T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22622
published_at 2026-04-12T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3433
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433
8
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
9
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
10
reference_url http://www.debian.org/security/2012/dsa-2531
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2531
11
reference_url http://www.openwall.com/lists/oss-security/2012/08/09/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/08/09/3
12
reference_url http://www.securityfocus.com/bid/54942
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54942
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683279
reference_id 683279
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683279
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=843582
reference_id 843582
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=843582
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3433
reference_id CVE-2012-3433
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3433
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://xenbits.xen.org/xsa/advisory-11.html
reference_id XSA-11
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-11.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-3433
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d482-9v57-dyg3
22
url VCID-dty8-26vq-yqbq
vulnerability_id VCID-dty8-26vq-yqbq
summary Nested HVM exposes host to being driven out of memory by guest
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0152.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0152
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16511
published_at 2026-04-16T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16525
published_at 2026-04-01T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16706
published_at 2026-04-02T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16768
published_at 2026-04-04T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16559
published_at 2026-04-07T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16644
published_at 2026-04-08T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16696
published_at 2026-04-09T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16675
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16634
published_at 2026-04-12T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16574
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0152
2
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
3
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
4
reference_url http://www.openwall.com/lists/oss-security/2013/01/23/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/01/23/8
5
reference_url http://www.securitytracker.com/id/1028032
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028032
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=893144
reference_id 893144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=893144
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0152
reference_id CVE-2013-0152
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0152
9
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
10
reference_url https://xenbits.xen.org/xsa/advisory-35.html
reference_id XSA-35
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-35.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-0152
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dty8-26vq-yqbq
23
url VCID-e797-dkq8-2kfp
vulnerability_id VCID-e797-dkq8-2kfp
summary grant table hypercall acquire/release imbalance
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1964.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1964.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1964
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2283
published_at 2026-04-16T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22753
published_at 2026-04-01T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22925
published_at 2026-04-02T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22969
published_at 2026-04-04T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22762
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22836
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.2289
published_at 2026-04-09T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22911
published_at 2026-04-11T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22873
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22817
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1964
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
7
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
8
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
9
reference_url http://www.debian.org/security/2013/dsa-2666
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2666
10
reference_url http://www.openwall.com/lists/oss-security/2013/04/18/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/18/9
11
reference_url http://www.securityfocus.com/bid/59293
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59293
12
reference_url http://www.securitytracker.com/id/1028459
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028459
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=953632
reference_id 953632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=953632
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1964
reference_id CVE-2013-1964
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1964
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://xenbits.xen.org/xsa/advisory-50.html
reference_id XSA-50
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-50.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1964
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e797-dkq8-2kfp
24
url VCID-e7fa-udtd-eugj
vulnerability_id VCID-e7fa-udtd-eugj
summary several HVM operations do not validate the range of their inputs
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5511.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5511.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5511
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26032
published_at 2026-04-16T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26112
published_at 2026-04-01T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26193
published_at 2026-04-02T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26234
published_at 2026-04-04T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26006
published_at 2026-04-07T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26072
published_at 2026-04-08T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-09T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26133
published_at 2026-04-11T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26088
published_at 2026-04-12T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26029
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5511
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511
10
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
11
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
12
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
13
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
14
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
16
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
17
reference_url http://www.debian.org/security/2013/dsa-2636
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2636
18
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/10
19
reference_url http://www.osvdb.org/88129
reference_id
reference_type
scores
url http://www.osvdb.org/88129
20
reference_url http://www.securityfocus.com/bid/56796
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56796
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877365
reference_id 877365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877365
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5511
reference_id CVE-2012-5511
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5511
34
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
35
reference_url https://xenbits.xen.org/xsa/advisory-27.html
reference_id XSA-27
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-27.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5511
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7fa-udtd-eugj
25
url VCID-egfe-8d7p-mfaf
vulnerability_id VCID-egfe-8d7p-mfaf
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6036.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6036.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6036
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-16T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32343
published_at 2026-04-01T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32494
published_at 2026-04-02T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32529
published_at 2026-04-04T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32351
published_at 2026-04-07T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.324
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32428
published_at 2026-04-09T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32431
published_at 2026-04-11T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32393
published_at 2026-04-12T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32365
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6036
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6036
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80326
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80326
10
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
11
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
12
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
13
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6036
reference_id CVE-2012-6036
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6036
19
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
20
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6036
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-egfe-8d7p-mfaf
26
url VCID-fkzr-8wde-fkbk
vulnerability_id VCID-fkzr-8wde-fkbk
summary guest administrator can access qemu monitor console
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00007.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00007.html
6
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00008.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00008.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4411.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4411.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4411
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21945
published_at 2026-04-16T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21905
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22067
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22118
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21893
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21975
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.2203
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4411
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411
10
reference_url http://secunia.com/advisories/50493
reference_id
reference_type
scores
url http://secunia.com/advisories/50493
11
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
12
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
13
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
14
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
15
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
16
reference_url http://www.debian.org/security/2012/dsa-2543
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2543
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/06/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/06/2
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/06/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/06/7
19
reference_url http://www.openwall.com/lists/oss-security/2012/09/07/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/07/5
20
reference_url http://www.securityfocus.com/bid/55442
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55442
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=855140
reference_id 855140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=855140
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4411
reference_id CVE-2012-4411
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4411
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
28
reference_url https://xenbits.xen.org/xsa/advisory-19.html
reference_id XSA-19
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-19.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-4411
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkzr-8wde-fkbk
27
url VCID-fu3d-da48-y3ct
vulnerability_id VCID-fu3d-da48-y3ct
summary Unhooking empty PAE entries DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html
7
reference_url http://osvdb.org/87306
reference_id
reference_type
scores
url http://osvdb.org/87306
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4538.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4538.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4538
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16744
published_at 2026-04-16T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16785
published_at 2026-04-01T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16954
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1701
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16793
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16882
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16939
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16913
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16868
published_at 2026-04-12T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.1681
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4538
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538
11
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
12
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
13
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
14
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
15
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
16
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
17
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80025
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80025
19
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
20
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/3
21
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
22
reference_url http://www.securitytracker.com/id?1027762
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027762
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870106
reference_id 870106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870106
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4538
reference_id CVE-2012-4538
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4538
28
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
29
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
30
reference_url https://xenbits.xen.org/xsa/advisory-23.html
reference_id XSA-23
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-23.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-4538
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fu3d-da48-y3ct
28
url VCID-gka7-s2f9-xycf
vulnerability_id VCID-gka7-s2f9-xycf
summary Multiple vulnerabilities in libelf PV kernel handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2196.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2196
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11831
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11946
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11992
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11784
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11867
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1192
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11928
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11888
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11861
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11727
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=970631
reference_id 970631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=970631
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-55.html
reference_id XSA-55
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-55.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2196
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gka7-s2f9-xycf
29
url VCID-j64d-px9g-qud1
vulnerability_id VCID-j64d-px9g-qud1
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6032.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6032.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6032
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29156
published_at 2026-04-16T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29179
published_at 2026-04-01T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29255
published_at 2026-04-02T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29305
published_at 2026-04-04T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29118
published_at 2026-04-07T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29182
published_at 2026-04-12T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29223
published_at 2026-04-09T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29228
published_at 2026-04-11T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.2913
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6032
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6032
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6032
reference_id CVE-2012-6032
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6032
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6032
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j64d-px9g-qud1
30
url VCID-jhnb-rufu-8ubj
vulnerability_id VCID-jhnb-rufu-8ubj
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3262.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3262.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3262
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26634
published_at 2026-04-01T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.2668
published_at 2026-04-02T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26721
published_at 2026-04-04T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26506
published_at 2026-04-07T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26574
published_at 2026-04-08T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26623
published_at 2026-04-09T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26628
published_at 2026-04-11T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26584
published_at 2026-04-12T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26526
published_at 2026-04-13T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26533
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3262
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3262
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3262
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=696927
reference_id 696927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=696927
4
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
5
reference_url https://access.redhat.com/errata/RHSA-2011:0496
reference_id RHSA-2011:0496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0496
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2011-3262
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhnb-rufu-8ubj
31
url VCID-k6c1-7yj2-myay
vulnerability_id VCID-k6c1-7yj2-myay
summary Memory mapping failure DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html
8
reference_url http://osvdb.org/87307
reference_id
reference_type
scores
url http://osvdb.org/87307
9
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4537.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4537.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4537
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.2864
published_at 2026-04-16T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28667
published_at 2026-04-01T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28752
published_at 2026-04-02T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28799
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28606
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28671
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28712
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28669
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28621
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4537
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537
13
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
14
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
15
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
16
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
17
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
18
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
19
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80024
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80024
21
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
22
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/6
23
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
24
reference_url http://www.securitytracker.com/id?1027761
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027761
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870101
reference_id 870101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870101
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4537
reference_id CVE-2012-4537
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4537
42
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
43
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
44
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
45
reference_url https://xenbits.xen.org/xsa/advisory-22.html
reference_id XSA-22
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-22.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-4537
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6c1-7yj2-myay
32
url VCID-m4fg-qcbu-m7e4
vulnerability_id VCID-m4fg-qcbu-m7e4
summary XENMEM_populate_physmap DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3496.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3496
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26098
published_at 2026-04-16T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26182
published_at 2026-04-01T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26262
published_at 2026-04-02T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26303
published_at 2026-04-04T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26074
published_at 2026-04-07T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26141
published_at 2026-04-08T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26189
published_at 2026-04-09T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26197
published_at 2026-04-11T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26151
published_at 2026-04-12T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3496
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854590
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=854590
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496
12
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
13
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
14
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
15
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
16
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
17
reference_url http://securitytracker.com/id?1027481
reference_id
reference_type
scores
url http://securitytracker.com/id?1027481
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78267
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78267
19
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
20
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-14_XENMEM_populate_physmap_DoS_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-14_XENMEM_populate_physmap_DoS_vulnerability
21
reference_url http://www.debian.org/security/2012/dsa-2544
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2544
22
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/7
23
reference_url http://www.osvdb.org/85200
reference_id
reference_type
scores
url http://www.osvdb.org/85200
24
reference_url http://www.securityfocus.com/bid/55412
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55412
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851172
reference_id 851172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851172
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3496
reference_id CVE-2012-3496
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3496
32
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
33
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
34
reference_url https://xenbits.xen.org/xsa/advisory-14.html
reference_id XSA-14
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-14.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-3496
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4fg-qcbu-m7e4
33
url VCID-mnb7-8ygk-kuhs
vulnerability_id VCID-mnb7-8ygk-kuhs
summary Multiple vulnerabilities in libelf PV kernel handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2194.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2194.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2194
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11831
published_at 2026-04-01T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11946
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11992
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11784
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11867
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.1192
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11928
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11888
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11861
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11727
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2194
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=970631
reference_id 970631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=970631
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-55.html
reference_id XSA-55
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-55.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2194
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mnb7-8ygk-kuhs
34
url VCID-mrv7-87w6-vqdk
vulnerability_id VCID-mrv7-87w6-vqdk
summary pirq range check DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html
5
reference_url http://osvdb.org/87297
reference_id
reference_type
scores
url http://osvdb.org/87297
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4536.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4536.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4536
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24259
published_at 2026-04-16T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24275
published_at 2026-04-01T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24402
published_at 2026-04-02T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24435
published_at 2026-04-04T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24217
published_at 2026-04-07T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24283
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24327
published_at 2026-04-09T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24343
published_at 2026-04-11T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.243
published_at 2026-04-12T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24243
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4536
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536
9
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
10
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
11
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
12
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
13
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
14
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80023
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80023
16
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/2
17
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
18
reference_url http://www.securitytracker.com/id?1027760
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027760
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870096
reference_id 870096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870096
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4536
reference_id CVE-2012-4536
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4536
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
24
reference_url https://xenbits.xen.org/xsa/advisory-21.html
reference_id XSA-21
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-21.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-4536
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrv7-87w6-vqdk
35
url VCID-nb86-6sk5-8yas
vulnerability_id VCID-nb86-6sk5-8yas
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6035.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6035.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6035
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28842
published_at 2026-04-16T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28866
published_at 2026-04-01T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28943
published_at 2026-04-02T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28992
published_at 2026-04-04T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28798
published_at 2026-04-07T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-08T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28908
published_at 2026-04-09T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28913
published_at 2026-04-11T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28869
published_at 2026-04-12T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.2882
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6035
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6035
reference_id CVE-2012-6035
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6035
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6035
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nb86-6sk5-8yas
36
url VCID-pncq-kkun-buae
vulnerability_id VCID-pncq-kkun-buae
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6031.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6031.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6031
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18326
published_at 2026-04-16T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18436
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18581
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18636
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18345
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18428
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.1848
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18432
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18381
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6031
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6031
reference_id CVE-2012-6031
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6031
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6031
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pncq-kkun-buae
37
url VCID-rtgs-1b4s-53d2
vulnerability_id VCID-rtgs-1b4s-53d2
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6034.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6034.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6034
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32134
published_at 2026-04-16T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32099
published_at 2026-04-13T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32226
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32264
published_at 2026-04-04T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32088
published_at 2026-04-07T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32138
published_at 2026-04-08T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32165
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32169
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32131
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6034
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6034
reference_id CVE-2012-6034
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6034
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6034
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rtgs-1b4s-53d2
38
url VCID-ruer-yx4b-gyhz
vulnerability_id VCID-ruer-yx4b-gyhz
summary libxl allows guest write access to sensitive console related xenstore keys
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2211.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2211
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.4606
published_at 2026-04-01T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.461
published_at 2026-04-02T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46121
published_at 2026-04-09T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46068
published_at 2026-04-07T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46124
published_at 2026-04-08T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46145
published_at 2026-04-11T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46117
published_at 2026-04-12T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46126
published_at 2026-04-13T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46183
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=971503
reference_id 971503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=971503
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-57.html
reference_id XSA-57
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-57.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2211
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ruer-yx4b-gyhz
39
url VCID-s1nr-a4yy-vuaw
vulnerability_id VCID-s1nr-a4yy-vuaw
summary Hypervisor crash due to incorrect ASSERT (debug build only)
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
3
reference_url http://osvdb.org/88913
reference_id
reference_type
scores
url http://osvdb.org/88913
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0154.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0154.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0154
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22215
published_at 2026-04-16T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22173
published_at 2026-04-01T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.2233
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22375
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.2216
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22242
published_at 2026-04-08T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22295
published_at 2026-04-09T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22315
published_at 2026-04-11T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22273
published_at 2026-04-12T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22214
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0154
6
reference_url http://seclists.org/oss-sec/2013/q1/att-17/xsa37-4_2.patch
reference_id
reference_type
scores
url http://seclists.org/oss-sec/2013/q1/att-17/xsa37-4_2.patch
7
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
8
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80977
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80977
10
reference_url http://www.openwall.com/lists/oss-security/2013/01/04/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/01/04/2
11
reference_url http://www.securityfocus.com/bid/57159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57159
12
reference_url http://www.securitytracker.com/id?1027937
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027937
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=892647
reference_id 892647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=892647
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0154
reference_id CVE-2013-0154
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0154
16
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
17
reference_url https://xenbits.xen.org/xsa/advisory-37.html
reference_id XSA-37
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-37.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-0154
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s1nr-a4yy-vuaw
40
url VCID-sjcb-7vtd-k3gn
vulnerability_id VCID-sjcb-7vtd-k3gn
summary Several long latency operations are not preemptible
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1918.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1918.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1918
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26687
published_at 2026-04-16T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26789
published_at 2026-04-01T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26832
published_at 2026-04-02T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26872
published_at 2026-04-04T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-07T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26726
published_at 2026-04-08T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26776
published_at 2026-04-09T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.2678
published_at 2026-04-11T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26735
published_at 2026-04-12T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26679
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1918
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
7
reference_url http://secunia.com/advisories/53187
reference_id
reference_type
scores
url http://secunia.com/advisories/53187
8
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
9
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
10
reference_url http://www.debian.org/security/2013/dsa-2666
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2666
11
reference_url http://www.openwall.com/lists/oss-security/2013/05/02/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/02/8
12
reference_url http://www.securityfocus.com/bid/59615
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59615
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=956163
reference_id 956163
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=956163
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1918
reference_id CVE-2013-1918
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1918
24
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
25
reference_url https://xenbits.xen.org/xsa/advisory-45.html
reference_id XSA-45
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-45.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1918
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sjcb-7vtd-k3gn
41
url VCID-skd7-zpbc-8fdj
vulnerability_id VCID-skd7-zpbc-8fdj
summary Information leak on XSAVE/XRSTOR capable AMD CPUs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2076.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2076
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.2604
published_at 2026-04-01T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26123
published_at 2026-04-02T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26164
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25932
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26051
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26061
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26015
published_at 2026-04-12T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.25956
published_at 2026-04-13T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.25962
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2076
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=964259
reference_id 964259
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=964259
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://xenbits.xen.org/xsa/advisory-52.html
reference_id XSA-52
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-52.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-2076
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skd7-zpbc-8fdj
42
url VCID-su2v-p4ap-xqes
vulnerability_id VCID-su2v-p4ap-xqes
summary PV guest host Denial of Service
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
2
reference_url http://lists.xen.org/archives/html/xen-announce/2012-06/msg00002.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-06/msg00002.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2934.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2934.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2934
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.38027
published_at 2026-04-16T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-01T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38058
published_at 2026-04-02T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.38083
published_at 2026-04-04T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37964
published_at 2026-04-07T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.38015
published_at 2026-04-08T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.38026
published_at 2026-04-09T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.38043
published_at 2026-04-11T12:55:00Z
8
value 0.00168
scoring_system epss
scoring_elements 0.38006
published_at 2026-04-12T12:55:00Z
9
value 0.00168
scoring_system epss
scoring_elements 0.37982
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2934
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934
6
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
7
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
8
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
9
reference_url http://support.amd.com/us/Processor_TechDocs/25759.pdf
reference_id
reference_type
scores
url http://support.amd.com/us/Processor_TechDocs/25759.pdf
10
reference_url http://www.debian.org/security/2012/dsa-2501
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2501
11
reference_url http://www.securityfocus.com/bid/53961
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/53961
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=824966
reference_id 824966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=824966
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2934
reference_id CVE-2012-2934
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-2934
16
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
17
reference_url https://access.redhat.com/errata/RHSA-2012:0721
reference_id RHSA-2012:0721
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0721
18
reference_url https://xenbits.xen.org/xsa/advisory-9.html
reference_id XSA-9
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-9.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-2934
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-su2v-p4ap-xqes
43
url VCID-th6r-zg29-gfga
vulnerability_id VCID-th6r-zg29-gfga
summary qemu-nbd format-guessing due to missing format specification
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103621.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103621.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103637.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103637.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104036.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104036.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1922.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1922.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1922
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.23375
published_at 2026-04-16T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23314
published_at 2026-04-01T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23487
published_at 2026-04-02T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23523
published_at 2026-04-04T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23307
published_at 2026-04-07T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.23379
published_at 2026-04-08T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.2343
published_at 2026-04-09T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.2345
published_at 2026-04-11T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23412
published_at 2026-04-12T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23357
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1922
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url http://www.openwall.com/lists/oss-security/2013/04/15/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/15/3
9
reference_url http://www.openwall.com/lists/oss-security/2013/04/16/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/04/16/2
10
reference_url http://www.securitytracker.com/id/1028426
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028426
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705544
reference_id 705544
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705544
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=923219
reference_id 923219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=923219
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1922
reference_id CVE-2013-1922
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1922
17
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
18
reference_url https://xenbits.xen.org/xsa/advisory-48.html
reference_id XSA-48
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-48.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1922
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-th6r-zg29-gfga
44
url VCID-ucny-a3xb-pfgc
vulnerability_id VCID-ucny-a3xb-pfgc
summary hypercall physdev_get_free_pirq vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3495.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3495.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3495
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23776
published_at 2026-04-16T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23783
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23944
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23733
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23804
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.2385
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23865
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23821
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23764
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3495
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495
9
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
10
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
11
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
12
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
13
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability
14
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/6
15
reference_url http://www.securityfocus.com/bid/55406
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55406
16
reference_url http://www.securitytracker.com/id?1027480
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027480
17
reference_url http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593
reference_id
reference_type
scores
url http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851165
reference_id 851165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851165
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3495
reference_id CVE-2012-3495
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3495
32
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
33
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
34
reference_url https://xenbits.xen.org/xsa/advisory-13.html
reference_id XSA-13
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-13.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-3495
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucny-a3xb-pfgc
45
url VCID-v516-ebvk-zfap
vulnerability_id VCID-v516-ebvk-zfap
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6033.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6033.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6033
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-16T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21567
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21737
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21792
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21543
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.2162
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21678
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21689
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21594
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6033
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6033
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6033
reference_id CVE-2012-6033
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6033
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-6033
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v516-ebvk-zfap
46
url VCID-vcb4-ne2n-83hx
vulnerability_id VCID-vcb4-ne2n-83hx
summary HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5512.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5512.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5512
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24354
published_at 2026-04-16T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24367
published_at 2026-04-01T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24493
published_at 2026-04-02T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24526
published_at 2026-04-04T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24308
published_at 2026-04-07T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24376
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.2442
published_at 2026-04-09T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24437
published_at 2026-04-11T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24394
published_at 2026-04-12T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24337
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512
7
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
8
reference_url http://secunia.com/advisories/51486
reference_id
reference_type
scores
url http://secunia.com/advisories/51486
9
reference_url http://secunia.com/advisories/51487
reference_id
reference_type
scores
url http://secunia.com/advisories/51487
10
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
11
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80481
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80481
13
reference_url http://support.citrix.com/article/CTX135777
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX135777
14
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/7
15
reference_url http://www.osvdb.org/88132
reference_id
reference_type
scores
url http://www.osvdb.org/88132
16
reference_url http://www.securityfocus.com/bid/56799
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56799
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877385
reference_id 877385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877385
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5512
reference_id CVE-2012-5512
reference_type
scores
0
value 3.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-5512
20
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
21
reference_url https://xenbits.xen.org/xsa/advisory-28.html
reference_id XSA-28
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-28.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5512
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcb4-ne2n-83hx
47
url VCID-vj48-rcw7-vuac
vulnerability_id VCID-vj48-rcw7-vuac
summary HVM guest user mode MMIO emulation DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
4
reference_url http://lists.xen.org/archives/html/xen-devel/2012-07/msg01649.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-devel/2012-07/msg01649.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3432.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3432.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3432
reference_id
reference_type
scores
0
value 0.0142
scoring_system epss
scoring_elements 0.80615
published_at 2026-04-16T12:55:00Z
1
value 0.0142
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-01T12:55:00Z
2
value 0.0142
scoring_system epss
scoring_elements 0.80537
published_at 2026-04-02T12:55:00Z
3
value 0.0142
scoring_system epss
scoring_elements 0.8056
published_at 2026-04-04T12:55:00Z
4
value 0.0142
scoring_system epss
scoring_elements 0.80552
published_at 2026-04-07T12:55:00Z
5
value 0.0142
scoring_system epss
scoring_elements 0.80581
published_at 2026-04-08T12:55:00Z
6
value 0.0142
scoring_system epss
scoring_elements 0.8059
published_at 2026-04-09T12:55:00Z
7
value 0.0142
scoring_system epss
scoring_elements 0.80607
published_at 2026-04-11T12:55:00Z
8
value 0.0142
scoring_system epss
scoring_elements 0.80594
published_at 2026-04-12T12:55:00Z
9
value 0.0142
scoring_system epss
scoring_elements 0.80586
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3432
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432
8
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
9
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
10
reference_url http://www.debian.org/security/2012/dsa-2531
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2531
11
reference_url http://www.securityfocus.com/bid/54691
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/54691
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683279
reference_id 683279
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683279
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=843570
reference_id 843570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=843570
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3432
reference_id CVE-2012-3432
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3432
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://xenbits.xen.org/xsa/advisory-10.html
reference_id XSA-10
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-10.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-3432
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vj48-rcw7-vuac
48
url VCID-vmj3-kufn-skcw
vulnerability_id VCID-vmj3-kufn-skcw
summary several hypercalls do not validate input GFNs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5525.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5525
reference_id
reference_type
scores
0
value 0.06889
scoring_system epss
scoring_elements 0.91407
published_at 2026-04-16T12:55:00Z
1
value 0.06889
scoring_system epss
scoring_elements 0.91332
published_at 2026-04-01T12:55:00Z
2
value 0.06889
scoring_system epss
scoring_elements 0.91336
published_at 2026-04-02T12:55:00Z
3
value 0.06889
scoring_system epss
scoring_elements 0.91346
published_at 2026-04-04T12:55:00Z
4
value 0.06889
scoring_system epss
scoring_elements 0.91354
published_at 2026-04-07T12:55:00Z
5
value 0.06889
scoring_system epss
scoring_elements 0.91366
published_at 2026-04-08T12:55:00Z
6
value 0.06889
scoring_system epss
scoring_elements 0.91373
published_at 2026-04-09T12:55:00Z
7
value 0.06889
scoring_system epss
scoring_elements 0.9138
published_at 2026-04-11T12:55:00Z
8
value 0.06889
scoring_system epss
scoring_elements 0.91382
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5525
2
reference_url http://secunia.com/advisories/51397
reference_id
reference_type
scores
url http://secunia.com/advisories/51397
3
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
4
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80480
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80480
6
reference_url http://www.openwall.com/lists/oss-security/2012/12/03/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/03/6
7
reference_url http://www.osvdb.org/88133
reference_id
reference_type
scores
url http://www.osvdb.org/88133
8
reference_url http://www.securityfocus.com/bid/56805
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56805
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=877404
reference_id 877404
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=877404
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5525
reference_id CVE-2012-5525
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5525
12
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
13
reference_url https://xenbits.xen.org/xsa/advisory-32.html
reference_id XSA-32
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-32.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5525
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vmj3-kufn-skcw
49
url VCID-vq33-jrrb-7kgk
vulnerability_id VCID-vq33-jrrb-7kgk
summary Grant table hypercall infinite loop DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4539.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4539.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4539
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.2247
published_at 2026-04-16T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22399
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22609
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22396
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22477
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22532
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.2255
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22509
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22455
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4539
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539
11
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
12
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
13
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
14
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
15
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
16
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
17
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
19
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
20
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/4
21
reference_url http://www.osvdb.org/87305
reference_id
reference_type
scores
url http://www.osvdb.org/87305
22
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
23
reference_url http://www.securitytracker.com/id?1027763
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027763
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870110
reference_id 870110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870110
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4539
reference_id CVE-2012-4539
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4539
36
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
37
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
38
reference_url https://xenbits.xen.org/xsa/advisory-24.html
reference_id XSA-24
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-24.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
2
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0
3
url pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.6.0-r9
aliases CVE-2012-4539
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vq33-jrrb-7kgk
50
url VCID-wgmf-2zuh-z3fn
vulnerability_id VCID-wgmf-2zuh-z3fn
summary Xen <= 3.3 DoS due to incorrect virtual address validation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2901.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2901
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30841
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30967
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.31015
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30833
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30891
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30921
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30923
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.3088
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30836
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30867
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2901
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=728042
reference_id 728042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=728042
3
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
4
reference_url https://access.redhat.com/errata/RHSA-2011:1212
reference_id RHSA-2011:1212
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1212
5
reference_url https://access.redhat.com/errata/RHSA-2011:1813
reference_id RHSA-2011:1813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1813
6
reference_url https://xenbits.xen.org/xsa/advisory-4.html
reference_id XSA-4
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-4.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2011-2901
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgmf-2zuh-z3fn
51
url VCID-xq5m-5tdr-2bbk
vulnerability_id VCID-xq5m-5tdr-2bbk
summary VT-d interrupt remapping source validation flaw for bridges
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
2
reference_url http://osvdb.org/92984
reference_id
reference_type
scores
url http://osvdb.org/92984
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1952.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1952.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1952
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21796
published_at 2026-04-16T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21765
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.2193
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21984
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21749
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21826
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21882
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21893
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21854
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1952
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
8
reference_url http://secunia.com/advisories/53312
reference_id
reference_type
scores
url http://secunia.com/advisories/53312
9
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
10
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/83968
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/83968
12
reference_url http://www.debian.org/security/2013/dsa-2666
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2666
13
reference_url http://www.openwall.com/lists/oss-security/2013/05/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/02/9
14
reference_url http://www.securityfocus.com/bid/59617
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59617
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=956309
reference_id 956309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=956309
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1952
reference_id CVE-2013-1952
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1952
30
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
31
reference_url https://xenbits.xen.org/xsa/advisory-49.html
reference_id XSA-49
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-49.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-1952
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq5m-5tdr-2bbk
52
url VCID-y3su-hg5m-g7hq
vulnerability_id VCID-y3su-hg5m-g7hq
summary VT-d interrupt remapping source validation flaw
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5634.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5634.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5634
reference_id
reference_type
scores
0
value 0.00363
scoring_system epss
scoring_elements 0.5846
published_at 2026-04-16T12:55:00Z
1
value 0.00363
scoring_system epss
scoring_elements 0.58312
published_at 2026-04-01T12:55:00Z
2
value 0.00363
scoring_system epss
scoring_elements 0.58397
published_at 2026-04-02T12:55:00Z
3
value 0.00363
scoring_system epss
scoring_elements 0.58417
published_at 2026-04-04T12:55:00Z
4
value 0.00363
scoring_system epss
scoring_elements 0.58391
published_at 2026-04-07T12:55:00Z
5
value 0.00363
scoring_system epss
scoring_elements 0.58443
published_at 2026-04-08T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.58449
published_at 2026-04-09T12:55:00Z
7
value 0.00363
scoring_system epss
scoring_elements 0.58467
published_at 2026-04-11T12:55:00Z
8
value 0.00363
scoring_system epss
scoring_elements 0.58447
published_at 2026-04-12T12:55:00Z
9
value 0.00363
scoring_system epss
scoring_elements 0.58428
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5634
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634
7
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
8
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
9
reference_url http://www.debian.org/security/2013/dsa-2636
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2636
10
reference_url http://www.openwall.com/lists/oss-security/2013/01/09/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/01/09/5
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=886959
reference_id 886959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=886959
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5634
reference_id CVE-2012-5634
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5634
21
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
22
reference_url https://xenbits.xen.org/xsa/advisory-33.html
reference_id XSA-33
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-33.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-5634
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3su-hg5m-g7hq
53
url VCID-z537-r2vm-q3b7
vulnerability_id VCID-z537-r2vm-q3b7
summary guest denial of service on syscall/sysenter exception generation
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-06/msg00003.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-06/msg00003.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0218.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0218.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0218
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20382
published_at 2026-04-16T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20398
published_at 2026-04-01T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20544
published_at 2026-04-02T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20602
published_at 2026-04-04T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20331
published_at 2026-04-07T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20412
published_at 2026-04-08T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20469
published_at 2026-04-09T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20493
published_at 2026-04-11T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20448
published_at 2026-04-12T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20393
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0218
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218
4
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
5
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
6
reference_url http://www.debian.org/security/2012/dsa-2501
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2501
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=813908
reference_id 813908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=813908
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-0218
reference_id CVE-2012-0218
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-0218
12
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
13
reference_url https://xenbits.xen.org/xsa/advisory-8.html
reference_id XSA-8
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-8.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-0218
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z537-r2vm-q3b7
54
url VCID-z8uz-rfbs-dygu
vulnerability_id VCID-z8uz-rfbs-dygu
summary interrupt remap entries shared and old ones not cleared on AMD IOMMUs
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
4
reference_url http://osvdb.org/89867
reference_id
reference_type
scores
url http://osvdb.org/89867
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-0847.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0847.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0153.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0153.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0153
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30847
published_at 2026-04-16T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.3082
published_at 2026-04-01T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30949
published_at 2026-04-02T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30996
published_at 2026-04-04T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30813
published_at 2026-04-07T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-08T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30901
published_at 2026-04-09T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30904
published_at 2026-04-11T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30862
published_at 2026-04-12T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0153
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153
9
reference_url http://secunia.com/advisories/51881
reference_id
reference_type
scores
url http://secunia.com/advisories/51881
10
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
11
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/81831
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/81831
13
reference_url http://www.debian.org/security/2013/dsa-2636
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2636
14
reference_url http://www.openwall.com/lists/oss-security/2013/02/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/05/7
15
reference_url http://www.securityfocus.com/bid/57745
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57745
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=910903
reference_id 910903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=910903
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0153
reference_id CVE-2013-0153
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-0153
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://access.redhat.com/errata/RHSA-2013:0847
reference_id RHSA-2013:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0847
28
reference_url https://xenbits.xen.org/xsa/advisory-36.html
reference_id XSA-36
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-36.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2013-0153
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8uz-rfbs-dygu
55
url VCID-zmns-hhw6-wkar
vulnerability_id VCID-zmns-hhw6-wkar
summary qemu (e1000 device driver): Buffer overflow when processing large packets
references
0
reference_url http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html
4
reference_url http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html
reference_id
reference_type
scores
url http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
8
reference_url http://rhn.redhat.com/errata/RHSA-2013-0599.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0599.html
9
reference_url http://rhn.redhat.com/errata/RHSA-2013-0608.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0608.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2013-0609.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0609.html
11
reference_url http://rhn.redhat.com/errata/RHSA-2013-0610.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0610.html
12
reference_url http://rhn.redhat.com/errata/RHSA-2013-0639.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0639.html
13
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6075.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6075.json
14
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6075
reference_id
reference_type
scores
0
value 0.07525
scoring_system epss
scoring_elements 0.91832
published_at 2026-04-16T12:55:00Z
1
value 0.07525
scoring_system epss
scoring_elements 0.91769
published_at 2026-04-01T12:55:00Z
2
value 0.07525
scoring_system epss
scoring_elements 0.91778
published_at 2026-04-02T12:55:00Z
3
value 0.07525
scoring_system epss
scoring_elements 0.91784
published_at 2026-04-04T12:55:00Z
4
value 0.07525
scoring_system epss
scoring_elements 0.91792
published_at 2026-04-07T12:55:00Z
5
value 0.07525
scoring_system epss
scoring_elements 0.91804
published_at 2026-04-08T12:55:00Z
6
value 0.07525
scoring_system epss
scoring_elements 0.91811
published_at 2026-04-09T12:55:00Z
7
value 0.07525
scoring_system epss
scoring_elements 0.91814
published_at 2026-04-11T12:55:00Z
8
value 0.07525
scoring_system epss
scoring_elements 0.91816
published_at 2026-04-12T12:55:00Z
9
value 0.07525
scoring_system epss
scoring_elements 0.91812
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6075
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075
16
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
17
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
18
reference_url http://www.debian.org/security/2013/dsa-2607
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2607
19
reference_url http://www.debian.org/security/2013/dsa-2608
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2608
20
reference_url http://www.debian.org/security/2013/dsa-2619
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2619
21
reference_url http://www.openwall.com/lists/oss-security/2012/12/30/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/12/30/1
22
reference_url http://www.securityfocus.com/bid/57420
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57420
23
reference_url http://www.ubuntu.com/usn/USN-1692-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1692-1
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051
reference_id 696051
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=696051
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=889301
reference_id 889301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=889301
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6075
reference_id CVE-2012-6075
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6075
51
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
52
reference_url https://access.redhat.com/errata/RHSA-2013:0599
reference_id RHSA-2013:0599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0599
53
reference_url https://access.redhat.com/errata/RHSA-2013:0608
reference_id RHSA-2013:0608
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0608
54
reference_url https://access.redhat.com/errata/RHSA-2013:0609
reference_id RHSA-2013:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0609
55
reference_url https://access.redhat.com/errata/RHSA-2013:0610
reference_id RHSA-2013:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0610
56
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
57
reference_url https://access.redhat.com/errata/RHSA-2013:0639
reference_id RHSA-2013:0639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0639
58
reference_url https://usn.ubuntu.com/1692-1/
reference_id USN-1692-1
reference_type
scores
url https://usn.ubuntu.com/1692-1/
59
reference_url https://xenbits.xen.org/xsa/advisory-41.html
reference_id XSA-41
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-41.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r1
1
url pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
purl pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3
aliases CVE-2012-6075
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zmns-hhw6-wkar
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-pvgrub@4.2.2-r3