Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen@4.15.3
Typeebuild
Namespaceapp-emulation
Namexen
Version4.15.3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.16.6_pre1
Latest_non_vulnerable_version4.17.4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1w8k-r3j4-8fbq
vulnerability_id VCID-1w8k-r3j4-8fbq
summary certain VT-d IOMMUs may not work in shared page table mode
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28710
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13288
published_at 2026-04-24T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13314
published_at 2026-04-01T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13416
published_at 2026-04-02T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13482
published_at 2026-04-04T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13277
published_at 2026-04-07T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13361
published_at 2026-04-08T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13411
published_at 2026-04-09T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13381
published_at 2026-04-11T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13345
published_at 2026-04-12T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13297
published_at 2026-04-13T12:55:00Z
10
value 0.00043
scoring_system epss
scoring_elements 0.13202
published_at 2026-04-16T12:55:00Z
11
value 0.00043
scoring_system epss
scoring_elements 0.13201
published_at 2026-04-18T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.13282
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28710
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
3
reference_url https://xenbits.xen.org/xsa/advisory-390.html
reference_id XSA-390
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-390.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28710, XSA-390
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1w8k-r3j4-8fbq
1
url VCID-1wtd-67ef-1qej
vulnerability_id VCID-1wtd-67ef-1qej
summary IOMMU page mapping issues on x86
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28695
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33263
published_at 2026-04-24T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.3341
published_at 2026-04-01T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.3355
published_at 2026-04-02T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33583
published_at 2026-04-04T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33422
published_at 2026-04-07T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33466
published_at 2026-04-08T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.335
published_at 2026-04-09T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33504
published_at 2026-04-11T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33462
published_at 2026-04-12T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33439
published_at 2026-04-13T12:55:00Z
10
value 0.00137
scoring_system epss
scoring_elements 0.33475
published_at 2026-04-16T12:55:00Z
11
value 0.00137
scoring_system epss
scoring_elements 0.3345
published_at 2026-04-18T12:55:00Z
12
value 0.00137
scoring_system epss
scoring_elements 0.33417
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28695
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-378.html
reference_id XSA-378
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-378.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28695
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wtd-67ef-1qej
2
url VCID-4429-qf2w-jqg3
vulnerability_id VCID-4429-qf2w-jqg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40284
published_at 2026-04-08T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40015
published_at 2026-04-24T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40309
published_at 2026-04-04T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40231
published_at 2026-04-07T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40296
published_at 2026-04-09T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40308
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.4027
published_at 2026-04-12T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40251
published_at 2026-04-13T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40298
published_at 2026-04-16T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40266
published_at 2026-04-18T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.4019
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
reference_id 2090241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090241
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-21166, XSA-404
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3
3
url VCID-4spa-usqt-93b2
vulnerability_id VCID-4spa-usqt-93b2
summary x86 pv: Race condition in typeref acquisition
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26362
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-24T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14751
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14827
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.1463
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1472
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14779
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14739
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14702
published_at 2026-04-12T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14648
published_at 2026-04-13T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1454
published_at 2026-04-16T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14546
published_at 2026-04-18T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.1461
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26362
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
reference_id 1014414
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
11
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
12
reference_url https://xenbits.xen.org/xsa/advisory-401.html
reference_id XSA-401
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-401.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-26362, XSA-401
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4spa-usqt-93b2
4
url VCID-7wyt-uh2c-a3ha
vulnerability_id VCID-7wyt-uh2c-a3ha
summary x86 pv: Insufficient care with non-coherent mappings
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26363
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23968
published_at 2026-04-24T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24264
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24298
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.2415
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24194
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24213
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24171
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24115
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.2413
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.24117
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24093
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26363
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
reference_id 1014414
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
11
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
12
reference_url https://xenbits.xen.org/xsa/advisory-402.html
reference_id XSA-402
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-402.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-26363
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wyt-uh2c-a3ha
5
url VCID-9zqd-3x84-43gc
vulnerability_id VCID-9zqd-3x84-43gc
summary arm: guest_physmap_remove_page not removing the p2m mappings
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23033.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23033.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23033
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.26003
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.26045
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25938
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25948
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25906
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25852
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25856
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25838
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25808
published_at 2026-04-21T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25751
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2045043
reference_id 2045043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2045043
12
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
13
reference_url https://xenbits.xen.org/xsa/advisory-393.html
reference_id XSA-393
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-393.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-23033, XSA-393
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9zqd-3x84-43gc
6
url VCID-az8d-xrb4-3ug4
vulnerability_id VCID-az8d-xrb4-3ug4
summary Another race in XENMAPSPACE_grant_table handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28701
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.185
published_at 2026-04-24T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18682
published_at 2026-04-01T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18819
published_at 2026-04-02T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18872
published_at 2026-04-04T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18593
published_at 2026-04-07T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18673
published_at 2026-04-08T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18729
published_at 2026-04-09T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18732
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18684
published_at 2026-04-12T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18634
published_at 2026-04-13T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18578
published_at 2026-04-16T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18586
published_at 2026-04-18T12:55:00Z
12
value 0.0006
scoring_system epss
scoring_elements 0.18607
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28701
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-384.html
reference_id XSA-384
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-384.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28701, XSA-384
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-az8d-xrb4-3ug4
7
url VCID-csy7-esn4-u3gq
vulnerability_id VCID-csy7-esn4-u3gq
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
reference_id
reference_type
scores
0
value 0.00452
scoring_system epss
scoring_elements 0.63685
published_at 2026-04-02T12:55:00Z
1
value 0.00452
scoring_system epss
scoring_elements 0.63755
published_at 2026-04-24T12:55:00Z
2
value 0.00452
scoring_system epss
scoring_elements 0.63711
published_at 2026-04-04T12:55:00Z
3
value 0.00452
scoring_system epss
scoring_elements 0.63671
published_at 2026-04-07T12:55:00Z
4
value 0.00452
scoring_system epss
scoring_elements 0.63723
published_at 2026-04-08T12:55:00Z
5
value 0.00452
scoring_system epss
scoring_elements 0.6374
published_at 2026-04-12T12:55:00Z
6
value 0.00452
scoring_system epss
scoring_elements 0.63754
published_at 2026-04-11T12:55:00Z
7
value 0.00452
scoring_system epss
scoring_elements 0.63706
published_at 2026-04-13T12:55:00Z
8
value 0.00452
scoring_system epss
scoring_elements 0.63741
published_at 2026-04-16T12:55:00Z
9
value 0.00452
scoring_system epss
scoring_elements 0.63751
published_at 2026-04-18T12:55:00Z
10
value 0.00452
scoring_system epss
scoring_elements 0.63739
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
reference_id 2090237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090237
49
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5173
50
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5178
51
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.debian.org/security/2022/dsa-5184
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
53
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.gentoo.org/glsa/202208-23
54
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
56
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
57
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
58
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
59
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
60
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
61
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
62
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
63
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
64
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
65
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
66
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
67
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
68
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
69
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
70
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
72
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
73
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
74
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
75
reference_url https://usn.ubuntu.com/5486-1/
reference_id USN-5486-1
reference_type
scores
url https://usn.ubuntu.com/5486-1/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-21123
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq
8
url VCID-fqt9-2esb-ffan
vulnerability_id VCID-fqt9-2esb-ffan
summary PCI devices with RMRRs not deassigned correctly
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28702
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16617
published_at 2026-04-24T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16834
published_at 2026-04-11T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16789
published_at 2026-04-12T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.1673
published_at 2026-04-13T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16666
published_at 2026-04-16T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16674
published_at 2026-04-18T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16711
published_at 2026-04-21T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22583
published_at 2026-04-04T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22508
published_at 2026-04-09T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22541
published_at 2026-04-02T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22374
published_at 2026-04-01T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22371
published_at 2026-04-07T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22453
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28702
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
10
reference_url https://xenbits.xen.org/xsa/advisory-386.html
reference_id XSA-386
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-386.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28702, XSA-386
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqt9-2esb-ffan
9
url VCID-g72t-7kx1-abcs
vulnerability_id VCID-g72t-7kx1-abcs
summary xen/arm: No memory limit for dom0less domUs
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28700
reference_id
reference_type
scores
0
value 0.02126
scoring_system epss
scoring_elements 0.84211
published_at 2026-04-24T12:55:00Z
1
value 0.02126
scoring_system epss
scoring_elements 0.8409
published_at 2026-04-01T12:55:00Z
2
value 0.02126
scoring_system epss
scoring_elements 0.84103
published_at 2026-04-02T12:55:00Z
3
value 0.02126
scoring_system epss
scoring_elements 0.84121
published_at 2026-04-04T12:55:00Z
4
value 0.02126
scoring_system epss
scoring_elements 0.84122
published_at 2026-04-07T12:55:00Z
5
value 0.02126
scoring_system epss
scoring_elements 0.84145
published_at 2026-04-08T12:55:00Z
6
value 0.02126
scoring_system epss
scoring_elements 0.84151
published_at 2026-04-09T12:55:00Z
7
value 0.02126
scoring_system epss
scoring_elements 0.84168
published_at 2026-04-11T12:55:00Z
8
value 0.02126
scoring_system epss
scoring_elements 0.84163
published_at 2026-04-12T12:55:00Z
9
value 0.02126
scoring_system epss
scoring_elements 0.84158
published_at 2026-04-13T12:55:00Z
10
value 0.02126
scoring_system epss
scoring_elements 0.84181
published_at 2026-04-16T12:55:00Z
11
value 0.02126
scoring_system epss
scoring_elements 0.84182
published_at 2026-04-18T12:55:00Z
12
value 0.02126
scoring_system epss
scoring_elements 0.84186
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28700
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-383.html
reference_id XSA-383
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-383.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28700, XSA-383
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g72t-7kx1-abcs
10
url VCID-hg4z-ad3f-fbc2
vulnerability_id VCID-hg4z-ad3f-fbc2
summary x86 pv: Insufficient care with non-coherent mappings
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26364
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28936
published_at 2026-04-24T12:55:00Z
1
value 0.00108
scoring_system epss
scoring_elements 0.29219
published_at 2026-04-02T12:55:00Z
2
value 0.00108
scoring_system epss
scoring_elements 0.29272
published_at 2026-04-04T12:55:00Z
3
value 0.00108
scoring_system epss
scoring_elements 0.29086
published_at 2026-04-07T12:55:00Z
4
value 0.00108
scoring_system epss
scoring_elements 0.29149
published_at 2026-04-08T12:55:00Z
5
value 0.00108
scoring_system epss
scoring_elements 0.29191
published_at 2026-04-09T12:55:00Z
6
value 0.00108
scoring_system epss
scoring_elements 0.29197
published_at 2026-04-11T12:55:00Z
7
value 0.00108
scoring_system epss
scoring_elements 0.29151
published_at 2026-04-12T12:55:00Z
8
value 0.00108
scoring_system epss
scoring_elements 0.29099
published_at 2026-04-13T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29125
published_at 2026-04-16T12:55:00Z
10
value 0.00108
scoring_system epss
scoring_elements 0.29101
published_at 2026-04-18T12:55:00Z
11
value 0.00108
scoring_system epss
scoring_elements 0.29054
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26364
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
reference_id 1014414
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
11
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
12
reference_url https://xenbits.xen.org/xsa/advisory-402.html
reference_id XSA-402
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-402.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-26364, XSA-402
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hg4z-ad3f-fbc2
11
url VCID-kcj6-ua4t-ybgj
vulnerability_id VCID-kcj6-ua4t-ybgj
summary IOMMU page mapping issues on x86
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28696
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25785
published_at 2026-04-24T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25974
published_at 2026-04-01T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26057
published_at 2026-04-02T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.26099
published_at 2026-04-04T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25866
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25936
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25988
published_at 2026-04-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25998
published_at 2026-04-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25954
published_at 2026-04-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25894
published_at 2026-04-13T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25897
published_at 2026-04-16T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25879
published_at 2026-04-18T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25848
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28696
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-378.html
reference_id XSA-378
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-378.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28696
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kcj6-ua4t-ybgj
12
url VCID-mf8g-nbkw-f7gr
vulnerability_id VCID-mf8g-nbkw-f7gr
summary grant table v2 status pages may remain accessible after de-allocation
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28697
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18286
published_at 2026-04-24T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18458
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18603
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18658
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18367
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18449
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18502
published_at 2026-04-09T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18503
published_at 2026-04-11T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18455
published_at 2026-04-12T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18404
published_at 2026-04-13T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18348
published_at 2026-04-16T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.1836
published_at 2026-04-18T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18386
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28697
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-379.html
reference_id XSA-379
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-379.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28697, XSA-379
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mf8g-nbkw-f7gr
13
url VCID-qprv-989b-k3d3
vulnerability_id VCID-qprv-989b-k3d3
summary IOMMU page mapping issues on x86
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28694
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33234
published_at 2026-04-24T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.3338
published_at 2026-04-01T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33516
published_at 2026-04-02T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33549
published_at 2026-04-04T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.3339
published_at 2026-04-07T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33435
published_at 2026-04-08T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33469
published_at 2026-04-09T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33472
published_at 2026-04-11T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33431
published_at 2026-04-12T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33407
published_at 2026-04-13T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33444
published_at 2026-04-16T12:55:00Z
11
value 0.00136
scoring_system epss
scoring_elements 0.33419
published_at 2026-04-18T12:55:00Z
12
value 0.00136
scoring_system epss
scoring_elements 0.33388
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28694
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-378.html
reference_id XSA-378
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-378.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28694, XSA-378
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qprv-989b-k3d3
14
url VCID-s4nf-p69f-pue8
vulnerability_id VCID-s4nf-p69f-pue8
summary inadequate grant-v2 status frames array bounds check
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28699
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22263
published_at 2026-04-24T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22396
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22606
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22393
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22475
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22529
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22548
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22507
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22452
published_at 2026-04-13T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22468
published_at 2026-04-16T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22465
published_at 2026-04-18T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22415
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28699
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-382.html
reference_id XSA-382
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-382.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28699, XSA-382
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4nf-p69f-pue8
15
url VCID-td6e-x2qb-syg3
vulnerability_id VCID-td6e-x2qb-syg3
summary x86: MMIO Stale Data vulnerabilities
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
reference_id
reference_type
scores
0
value 0.00242
scoring_system epss
scoring_elements 0.47421
published_at 2026-04-02T12:55:00Z
1
value 0.00242
scoring_system epss
scoring_elements 0.47447
published_at 2026-04-13T12:55:00Z
2
value 0.00242
scoring_system epss
scoring_elements 0.47466
published_at 2026-04-11T12:55:00Z
3
value 0.00242
scoring_system epss
scoring_elements 0.47443
published_at 2026-04-09T12:55:00Z
4
value 0.00242
scoring_system epss
scoring_elements 0.47446
published_at 2026-04-08T12:55:00Z
5
value 0.00242
scoring_system epss
scoring_elements 0.47441
published_at 2026-04-12T12:55:00Z
6
value 0.00242
scoring_system epss
scoring_elements 0.47391
published_at 2026-04-07T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67507
published_at 2026-04-24T12:55:00Z
8
value 0.00536
scoring_system epss
scoring_elements 0.67499
published_at 2026-04-16T12:55:00Z
9
value 0.00536
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-18T12:55:00Z
10
value 0.00536
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url http://www.openwall.com/lists/oss-security/2022/06/16/1
reference_id 1
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://www.openwall.com/lists/oss-security/2022/06/16/1
48
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
reference_id 2090240
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090240
49
reference_url http://xenbits.xen.org/xsa/advisory-404.html
reference_id advisory-404.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url http://xenbits.xen.org/xsa/advisory-404.html
50
reference_url https://www.debian.org/security/2022/dsa-5173
reference_id dsa-5173
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5173
51
reference_url https://www.debian.org/security/2022/dsa-5178
reference_id dsa-5178
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5178
52
reference_url https://www.debian.org/security/2022/dsa-5184
reference_id dsa-5184
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.debian.org/security/2022/dsa-5184
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
reference_id FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/
54
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.gentoo.org/glsa/202208-23
55
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
reference_id intel-sa-00615.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html
56
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
reference_id MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/
57
reference_url https://security.netapp.com/advisory/ntap-20220624-0008/
reference_id ntap-20220624-0008
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://security.netapp.com/advisory/ntap-20220624-0008/
58
reference_url https://access.redhat.com/errata/RHSA-2022:5937
reference_id RHSA-2022:5937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5937
59
reference_url https://access.redhat.com/errata/RHSA-2022:5939
reference_id RHSA-2022:5939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5939
60
reference_url https://access.redhat.com/errata/RHSA-2022:6437
reference_id RHSA-2022:6437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6437
61
reference_url https://access.redhat.com/errata/RHSA-2022:6460
reference_id RHSA-2022:6460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6460
62
reference_url https://access.redhat.com/errata/RHSA-2022:6872
reference_id RHSA-2022:6872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6872
63
reference_url https://access.redhat.com/errata/RHSA-2022:6983
reference_id RHSA-2022:6983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6983
64
reference_url https://access.redhat.com/errata/RHSA-2022:6991
reference_id RHSA-2022:6991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6991
65
reference_url https://access.redhat.com/errata/RHSA-2022:7279
reference_id RHSA-2022:7279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7279
66
reference_url https://access.redhat.com/errata/RHSA-2022:7280
reference_id RHSA-2022:7280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7280
67
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
68
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
69
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
70
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
71
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
reference_id RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/
72
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
reference_id T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/
73
reference_url https://usn.ubuntu.com/5484-1/
reference_id USN-5484-1
reference_type
scores
url https://usn.ubuntu.com/5484-1/
74
reference_url https://usn.ubuntu.com/5485-1/
reference_id USN-5485-1
reference_type
scores
url https://usn.ubuntu.com/5485-1/
75
reference_url https://usn.ubuntu.com/5485-2/
reference_id USN-5485-2
reference_type
scores
url https://usn.ubuntu.com/5485-2/
76
reference_url https://usn.ubuntu.com/5505-1/
reference_id USN-5505-1
reference_type
scores
url https://usn.ubuntu.com/5505-1/
77
reference_url https://usn.ubuntu.com/5513-1/
reference_id USN-5513-1
reference_type
scores
url https://usn.ubuntu.com/5513-1/
78
reference_url https://usn.ubuntu.com/5529-1/
reference_id USN-5529-1
reference_type
scores
url https://usn.ubuntu.com/5529-1/
79
reference_url https://usn.ubuntu.com/5535-1/
reference_id USN-5535-1
reference_type
scores
url https://usn.ubuntu.com/5535-1/
80
reference_url https://xenbits.xen.org/xsa/advisory-404.html
reference_id XSA-404
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-404.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-21125
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3
16
url VCID-uunr-69dt-q7fn
vulnerability_id VCID-uunr-69dt-q7fn
summary long running loops in grant table handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28698
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17392
published_at 2026-04-24T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.175
published_at 2026-04-01T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17663
published_at 2026-04-02T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17709
published_at 2026-04-04T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17429
published_at 2026-04-07T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17522
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17582
published_at 2026-04-09T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17596
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17549
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17497
published_at 2026-04-13T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.1744
published_at 2026-04-16T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17449
published_at 2026-04-18T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17483
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28698
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
11
reference_url https://xenbits.xen.org/xsa/advisory-380.html
reference_id XSA-380
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-380.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2021-28698, XSA-380
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uunr-69dt-q7fn
17
url VCID-vs9k-akwv-h3ak
vulnerability_id VCID-vs9k-akwv-h3ak
summary A PV guest could DoS Xen while unmapping a grant
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23034.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23034.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23034
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28729
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28776
published_at 2026-04-04T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28584
published_at 2026-04-07T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28649
published_at 2026-04-08T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28689
published_at 2026-04-09T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28691
published_at 2026-04-11T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28647
published_at 2026-04-12T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.286
published_at 2026-04-13T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28619
published_at 2026-04-16T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28594
published_at 2026-04-18T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28545
published_at 2026-04-21T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28429
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23034
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2045041
reference_id 2045041
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2045041
13
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
14
reference_url https://xenbits.xen.org/xsa/advisory-394.html
reference_id XSA-394
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-394.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-23034, XSA-394
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vs9k-akwv-h3ak
18
url VCID-w2ch-guy5-6ye9
vulnerability_id VCID-w2ch-guy5-6ye9
summary Insufficient cleanup of passed-through device IRQs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23035.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23035.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23035
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30255
published_at 2026-04-02T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30304
published_at 2026-04-04T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.3012
published_at 2026-04-07T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.3018
published_at 2026-04-08T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30215
published_at 2026-04-09T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30218
published_at 2026-04-11T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30175
published_at 2026-04-12T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30128
published_at 2026-04-13T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30143
published_at 2026-04-16T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30125
published_at 2026-04-18T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30079
published_at 2026-04-21T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30009
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23035
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2045039
reference_id 2045039
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2045039
13
reference_url https://security.gentoo.org/glsa/202208-23
reference_id GLSA-202208-23
reference_type
scores
url https://security.gentoo.org/glsa/202208-23
14
reference_url https://xenbits.xen.org/xsa/advisory-395.html
reference_id XSA-395
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-395.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.15.3
purl pkg:ebuild/app-emulation/xen@4.15.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3
aliases CVE-2022-23035, XSA-395
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ch-guy5-6ye9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.3