Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen@4.17.4
Typeebuild
Namespaceapp-emulation
Namexen
Version4.17.4
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-36dt-1x7b-wqaa
vulnerability_id VCID-36dt-1x7b-wqaa
summary Linux: buffer overrun in netback due to unusual packet
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34319.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-34319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34319
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01572
published_at 2026-04-21T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01478
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01487
published_at 2026-04-11T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01491
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01495
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01479
published_at 2026-04-12T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.0148
published_at 2026-04-13T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01469
published_at 2026-04-16T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01483
published_at 2026-04-18T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01481
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34319
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230156
reference_id 2230156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230156
35
reference_url https://xenbits.xenproject.org/xsa/advisory-432.html
reference_id advisory-432.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-18T14:25:25Z/
url https://xenbits.xenproject.org/xsa/advisory-432.html
36
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
37
reference_url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_id Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-18T14:25:25Z/
url http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
38
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-18T14:25:25Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
39
reference_url https://security.netapp.com/advisory/ntap-20240202-0001/
reference_id ntap-20240202-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-18T14:25:25Z/
url https://security.netapp.com/advisory/ntap-20240202-0001/
40
reference_url https://usn.ubuntu.com/6343-1/
reference_id USN-6343-1
reference_type
scores
url https://usn.ubuntu.com/6343-1/
41
reference_url https://usn.ubuntu.com/6439-1/
reference_id USN-6439-1
reference_type
scores
url https://usn.ubuntu.com/6439-1/
42
reference_url https://usn.ubuntu.com/6439-2/
reference_id USN-6439-2
reference_type
scores
url https://usn.ubuntu.com/6439-2/
43
reference_url https://usn.ubuntu.com/6440-1/
reference_id USN-6440-1
reference_type
scores
url https://usn.ubuntu.com/6440-1/
44
reference_url https://usn.ubuntu.com/6440-2/
reference_id USN-6440-2
reference_type
scores
url https://usn.ubuntu.com/6440-2/
45
reference_url https://usn.ubuntu.com/6440-3/
reference_id USN-6440-3
reference_type
scores
url https://usn.ubuntu.com/6440-3/
46
reference_url https://usn.ubuntu.com/6441-1/
reference_id USN-6441-1
reference_type
scores
url https://usn.ubuntu.com/6441-1/
47
reference_url https://usn.ubuntu.com/6441-2/
reference_id USN-6441-2
reference_type
scores
url https://usn.ubuntu.com/6441-2/
48
reference_url https://usn.ubuntu.com/6441-3/
reference_id USN-6441-3
reference_type
scores
url https://usn.ubuntu.com/6441-3/
49
reference_url https://usn.ubuntu.com/6442-1/
reference_id USN-6442-1
reference_type
scores
url https://usn.ubuntu.com/6442-1/
50
reference_url https://usn.ubuntu.com/6444-1/
reference_id USN-6444-1
reference_type
scores
url https://usn.ubuntu.com/6444-1/
51
reference_url https://usn.ubuntu.com/6444-2/
reference_id USN-6444-2
reference_type
scores
url https://usn.ubuntu.com/6444-2/
52
reference_url https://usn.ubuntu.com/6445-1/
reference_id USN-6445-1
reference_type
scores
url https://usn.ubuntu.com/6445-1/
53
reference_url https://usn.ubuntu.com/6445-2/
reference_id USN-6445-2
reference_type
scores
url https://usn.ubuntu.com/6445-2/
54
reference_url https://usn.ubuntu.com/6446-1/
reference_id USN-6446-1
reference_type
scores
url https://usn.ubuntu.com/6446-1/
55
reference_url https://usn.ubuntu.com/6446-2/
reference_id USN-6446-2
reference_type
scores
url https://usn.ubuntu.com/6446-2/
56
reference_url https://usn.ubuntu.com/6446-3/
reference_id USN-6446-3
reference_type
scores
url https://usn.ubuntu.com/6446-3/
57
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
58
reference_url https://xenbits.xen.org/xsa/advisory-432.html
reference_id XSA-432
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-432.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34319
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36dt-1x7b-wqaa
1
url VCID-3bw4-631f-e7h6
vulnerability_id VCID-3bw4-631f-e7h6
summary arm32: The cache may not be properly cleaned/invalidated
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34321
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17266
published_at 2026-04-21T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17226
published_at 2026-04-16T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17232
published_at 2026-04-18T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17324
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17383
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17395
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17345
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17287
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954
reference_id 1051954
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954
3
reference_url https://xenbits.xenproject.org/xsa/advisory-437.html
reference_id advisory-437.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T15:52:01Z/
url https://xenbits.xenproject.org/xsa/advisory-437.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-437.html
reference_id XSA-437
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-437.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34321, XSA-437
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bw4-631f-e7h6
2
url VCID-3vdg-5g64-wkbt
vulnerability_id VCID-3vdg-5g64-wkbt
summary x86: shadow stack vs exceptions from emulation stubs
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46841
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20044
published_at 2026-04-21T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20162
published_at 2026-04-11T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20117
published_at 2026-04-12T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20059
published_at 2026-04-13T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-16T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20045
published_at 2026-04-18T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20274
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.19999
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20079
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20137
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46841
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-451.html
reference_id advisory-451.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/
url https://xenbits.xenproject.org/xsa/advisory-451.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-451.html
reference_id XSA-451
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-451.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46841, XSA-451
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdg-5g64-wkbt
3
url VCID-4rmg-db7g-u3hs
vulnerability_id VCID-4rmg-db7g-u3hs
summary pci: phantom functions assigned to incorrect contexts
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46839
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.4893
published_at 2026-04-02T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49001
published_at 2026-04-18T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48951
published_at 2026-04-12T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48959
published_at 2026-04-13T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49005
published_at 2026-04-16T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48955
published_at 2026-04-04T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48909
published_at 2026-04-07T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48963
published_at 2026-04-21T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48961
published_at 2026-04-09T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.48977
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270533
reference_id 2270533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270533
5
reference_url https://xenbits.xenproject.org/xsa/advisory-449.html
reference_id advisory-449.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:00:00Z/
url https://xenbits.xenproject.org/xsa/advisory-449.html
6
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
7
reference_url https://xenbits.xen.org/xsa/advisory-449.html
reference_id XSA-449
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-449.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46839, XSA-449
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rmg-db7g-u3hs
4
url VCID-5ktg-bhh1-ubbz
vulnerability_id VCID-5ktg-bhh1-ubbz
summary arm: Guests can trigger a deadlock on Cortex-A77
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34320
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28551
published_at 2026-04-21T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28734
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28782
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28589
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28655
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28695
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28697
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28653
published_at 2026-04-12T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28605
published_at 2026-04-13T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28625
published_at 2026-04-16T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.286
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34320
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-436.html
reference_id XSA-436
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-436.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34320, XSA-436
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktg-bhh1-ubbz
5
url VCID-6dax-cddv-7bbs
vulnerability_id VCID-6dax-cddv-7bbs
summary x86/AMD: Debug Mask handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34328
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-21T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29998
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.2986
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29921
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29963
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29916
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29867
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34328
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-444.html
reference_id XSA-444
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-444.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34328, XSA-444
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dax-cddv-7bbs
6
url VCID-6jqj-2qwn-8qd9
vulnerability_id VCID-6jqj-2qwn-8qd9
summary x86/AMD: Debug Mask handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34327
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-21T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29998
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29867
published_at 2026-04-13T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-16T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-18T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-04T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.2986
published_at 2026-04-07T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29921
published_at 2026-04-08T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-09T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29963
published_at 2026-04-11T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29916
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34327
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-444.html
reference_id advisory-444.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:36:52Z/
url https://xenbits.xenproject.org/xsa/advisory-444.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-444.html
reference_id XSA-444
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-444.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34327
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jqj-2qwn-8qd9
7
url VCID-8k1q-b2kj-w7hh
vulnerability_id VCID-8k1q-b2kj-w7hh
summary Multiple vulnerabilities in libfsimage disk handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34325
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21449
published_at 2026-04-21T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21614
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21479
published_at 2026-04-13T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21475
published_at 2026-04-16T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.2148
published_at 2026-04-18T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21671
published_at 2026-04-04T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21426
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21503
published_at 2026-04-08T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21562
published_at 2026-04-09T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21573
published_at 2026-04-11T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21535
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-443.html
reference_id advisory-443.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-30T18:38:25Z/
url https://xenbits.xenproject.org/xsa/advisory-443.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-443.html
reference_id XSA-443
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-443.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34325, XSA-443
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1q-b2kj-w7hh
8
url VCID-97zm-r9b6-uqdu
vulnerability_id VCID-97zm-r9b6-uqdu
summary xenstored: A transaction conflict can crash C Xenstored
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34323
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-21T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25175
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.2502
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-16T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-18T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25216
published_at 2026-04-04T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25055
published_at 2026-04-08T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.251
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25114
published_at 2026-04-11T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25074
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34323
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-440.html
reference_id advisory-440.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T16:40:56Z/
url https://xenbits.xenproject.org/xsa/advisory-440.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-440.html
reference_id XSA-440
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-440.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34323, XSA-440
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97zm-r9b6-uqdu
9
url VCID-ahxj-272k-gbfs
vulnerability_id VCID-ahxj-272k-gbfs
summary VT-d: Failure to quarantine devices in !HVM builds
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46840
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22223
published_at 2026-04-21T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22382
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22273
published_at 2026-04-13T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22278
published_at 2026-04-16T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22272
published_at 2026-04-18T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22428
published_at 2026-04-04T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22216
published_at 2026-04-07T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22299
published_at 2026-04-08T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22353
published_at 2026-04-09T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22374
published_at 2026-04-11T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22332
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46840
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://xenbits.xenproject.org/xsa/advisory-450.html
reference_id advisory-450.html
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-05T18:59:02Z/
url https://xenbits.xenproject.org/xsa/advisory-450.html
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-450.html
reference_id XSA-450
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-450.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46840, XSA-450
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxj-272k-gbfs
10
url VCID-b57c-x3pw-7fb7
vulnerability_id VCID-b57c-x3pw-7fb7
summary top-level shadow reference dropped too early for 64-bit PV guests
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34322
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18295
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18518
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18315
published_at 2026-04-13T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18259
published_at 2026-04-16T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18271
published_at 2026-04-18T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18573
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18279
published_at 2026-04-07T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18362
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18414
published_at 2026-04-11T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18366
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-438.html
reference_id advisory-438.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:50:09Z/
url https://xenbits.xenproject.org/xsa/advisory-438.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-438.html
reference_id XSA-438
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-438.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34322, XSA-438
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b57c-x3pw-7fb7
11
url VCID-bhdk-jmss-4qc8
vulnerability_id VCID-bhdk-jmss-4qc8
summary x86: BTC/SRSO fixes not fully effective
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46836
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05783
published_at 2026-04-21T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05668
published_at 2026-04-13T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05623
published_at 2026-04-16T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05635
published_at 2026-04-18T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05645
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05676
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05703
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-11T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05674
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46836
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
reference_id 1056928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
4
reference_url https://xenbits.xenproject.org/xsa/advisory-446.html
reference_id advisory-446.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:16:12Z/
url https://xenbits.xenproject.org/xsa/advisory-446.html
5
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
6
reference_url https://xenbits.xen.org/xsa/advisory-446.html
reference_id XSA-446
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-446.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46836, XSA-446
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhdk-jmss-4qc8
12
url VCID-byu1-7n9c-5fes
vulnerability_id VCID-byu1-7n9c-5fes
summary GhostRace: Speculative Race Conditions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2193
reference_id
reference_type
scores
0
value 0.00889
scoring_system epss
scoring_elements 0.75447
published_at 2026-04-02T12:55:00Z
1
value 0.00897
scoring_system epss
scoring_elements 0.75658
published_at 2026-04-21T12:55:00Z
2
value 0.00897
scoring_system epss
scoring_elements 0.75606
published_at 2026-04-04T12:55:00Z
3
value 0.00897
scoring_system epss
scoring_elements 0.75587
published_at 2026-04-07T12:55:00Z
4
value 0.00897
scoring_system epss
scoring_elements 0.75621
published_at 2026-04-08T12:55:00Z
5
value 0.00897
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-09T12:55:00Z
6
value 0.00897
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-11T12:55:00Z
7
value 0.00897
scoring_system epss
scoring_elements 0.75638
published_at 2026-04-12T12:55:00Z
8
value 0.00897
scoring_system epss
scoring_elements 0.75631
published_at 2026-04-13T12:55:00Z
9
value 0.00897
scoring_system epss
scoring_elements 0.75669
published_at 2026-04-16T12:55:00Z
10
value 0.00897
scoring_system epss
scoring_elements 0.75673
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/03/12/14
reference_id 14
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url http://www.openwall.com/lists/oss-security/2024/03/12/14
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262051
reference_id 2262051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262051
6
reference_url https://kb.cert.org/vuls/id/488902
reference_id 488902
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://kb.cert.org/vuls/id/488902
7
reference_url https://www.kb.cert.org/vuls/id/488902
reference_id 488902
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://www.kb.cert.org/vuls/id/488902
8
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
reference_id amd-sb-7016.html
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
reference_id EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
10
reference_url https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
reference_id ghostrace
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
11
reference_url https://www.vusec.net/projects/ghostrace/
reference_id ghostrace
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://www.vusec.net/projects/ghostrace/
12
reference_url https://download.vusec.net/papers/ghostrace_sec24.pdf
reference_id ghostrace_sec24.pdf
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://download.vusec.net/papers/ghostrace_sec24.pdf
13
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
reference_id H63LGAQXPEVJOES73U4XK65I6DASOAAG
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
15
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
reference_id ?id=944d5fe50f3f03daacfea16300e656a1691c4a23
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
16
reference_url https://xenbits.xen.org/xsa/advisory-453.html
reference_id XSA-453
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://xenbits.xen.org/xsa/advisory-453.html
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2024-2193, XSA-453
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byu1-7n9c-5fes
13
url VCID-js8w-3shz-xfan
vulnerability_id VCID-js8w-3shz-xfan
summary Multiple vulnerabilities in libfsimage disk handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-4949
reference_id
reference_type
scores
0
value 0.08142
scoring_system epss
scoring_elements 0.92147
published_at 2026-04-02T12:55:00Z
1
value 0.08627
scoring_system epss
scoring_elements 0.92414
published_at 2026-04-04T12:55:00Z
2
value 0.08627
scoring_system epss
scoring_elements 0.92417
published_at 2026-04-07T12:55:00Z
3
value 0.08627
scoring_system epss
scoring_elements 0.92429
published_at 2026-04-08T12:55:00Z
4
value 0.08627
scoring_system epss
scoring_elements 0.92434
published_at 2026-04-09T12:55:00Z
5
value 0.08627
scoring_system epss
scoring_elements 0.9244
published_at 2026-04-13T12:55:00Z
6
value 0.08627
scoring_system epss
scoring_elements 0.92442
published_at 2026-04-12T12:55:00Z
7
value 0.08627
scoring_system epss
scoring_elements 0.92451
published_at 2026-04-16T12:55:00Z
8
value 0.08627
scoring_system epss
scoring_elements 0.9245
published_at 2026-04-18T12:55:00Z
9
value 0.08841
scoring_system epss
scoring_elements 0.92557
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-4949
1
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
2
reference_url https://xenbits.xen.org/xsa/advisory-443.html
reference_id XSA-443
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-443.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2022-4949
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-js8w-3shz-xfan
14
url VCID-jz96-yhvb-rfhr
vulnerability_id VCID-jz96-yhvb-rfhr
summary Possible deadlock in Linux kernel event handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34324
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20778
published_at 2026-04-21T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20978
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.2083
published_at 2026-04-08T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20891
published_at 2026-04-09T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-11T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20863
published_at 2026-04-12T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20811
published_at 2026-04-13T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20801
published_at 2026-04-16T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20793
published_at 2026-04-18T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-04T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20751
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34324
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34324
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://xenbits.xenproject.org/xsa/advisory-441.html
reference_id advisory-441.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T18:58:19Z/
url https://xenbits.xenproject.org/xsa/advisory-441.html
21
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
22
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T18:58:19Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
23
reference_url https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-18T18:58:19Z/
url https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
24
reference_url https://usn.ubuntu.com/6461-1/
reference_id USN-6461-1
reference_type
scores
url https://usn.ubuntu.com/6461-1/
25
reference_url https://usn.ubuntu.com/6624-1/
reference_id USN-6624-1
reference_type
scores
url https://usn.ubuntu.com/6624-1/
26
reference_url https://usn.ubuntu.com/6625-1/
reference_id USN-6625-1
reference_type
scores
url https://usn.ubuntu.com/6625-1/
27
reference_url https://usn.ubuntu.com/6625-2/
reference_id USN-6625-2
reference_type
scores
url https://usn.ubuntu.com/6625-2/
28
reference_url https://usn.ubuntu.com/6625-3/
reference_id USN-6625-3
reference_type
scores
url https://usn.ubuntu.com/6625-3/
29
reference_url https://usn.ubuntu.com/6626-1/
reference_id USN-6626-1
reference_type
scores
url https://usn.ubuntu.com/6626-1/
30
reference_url https://usn.ubuntu.com/6626-2/
reference_id USN-6626-2
reference_type
scores
url https://usn.ubuntu.com/6626-2/
31
reference_url https://usn.ubuntu.com/6626-3/
reference_id USN-6626-3
reference_type
scores
url https://usn.ubuntu.com/6626-3/
32
reference_url https://usn.ubuntu.com/6628-1/
reference_id USN-6628-1
reference_type
scores
url https://usn.ubuntu.com/6628-1/
33
reference_url https://usn.ubuntu.com/6628-2/
reference_id USN-6628-2
reference_type
scores
url https://usn.ubuntu.com/6628-2/
34
reference_url https://usn.ubuntu.com/6652-1/
reference_id USN-6652-1
reference_type
scores
url https://usn.ubuntu.com/6652-1/
35
reference_url https://xenbits.xen.org/xsa/advisory-441.html
reference_id XSA-441
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-441.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-34324
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jz96-yhvb-rfhr
15
url VCID-p2fk-8snj-x7dy
vulnerability_id VCID-p2fk-8snj-x7dy
summary x86: Register File Data Sampling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14976
published_at 2026-04-21T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15947
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15885
published_at 2026-04-02T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15693
published_at 2026-04-18T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15683
published_at 2026-04-16T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-13T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-12T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15868
published_at 2026-04-11T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15893
published_at 2026-04-09T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15831
published_at 2026-04-08T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15746
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
250
reference_url http://www.openwall.com/lists/oss-security/2024/03/12/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url http://www.openwall.com/lists/oss-security/2024/03/12/13
251
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
reference_id 2270700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
252
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
reference_id EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
253
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
254
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
reference_id H63LGAQXPEVJOES73U4XK65I6DASOAAG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
255
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
reference_id intel-sa-00898.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
256
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
257
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
258
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
259
reference_url https://access.redhat.com/errata/RHSA-2024:8157
reference_id RHSA-2024:8157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8157
260
reference_url https://access.redhat.com/errata/RHSA-2024:8158
reference_id RHSA-2024:8158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8158
261
reference_url https://access.redhat.com/errata/RHSA-2024:8162
reference_id RHSA-2024:8162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8162
262
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
263
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
264
reference_url https://xenbits.xen.org/xsa/advisory-452.html
reference_id XSA-452
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-452.html
265
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-28746, XSA-452
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy
16
url VCID-rk2f-yqbb-nyd2
vulnerability_id VCID-rk2f-yqbb-nyd2
summary arm32: The cache may not be properly cleaned/invalidated (take two)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46837
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-21T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23872
published_at 2026-04-11T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23827
published_at 2026-04-12T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23771
published_at 2026-04-13T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23782
published_at 2026-04-16T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.2377
published_at 2026-04-18T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.2391
published_at 2026-04-02T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23951
published_at 2026-04-04T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-07T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.2381
published_at 2026-04-08T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23857
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46837
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837
2
reference_url https://xenbits.xenproject.org/xsa/advisory-447.html
reference_id advisory-447.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/
url https://xenbits.xenproject.org/xsa/advisory-447.html
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/
reference_id JFVKWYQFRUU3CAS53THTUKXEOUDWI42G
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/
reference_id XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/
6
reference_url https://xenbits.xen.org/xsa/advisory-447.html
reference_id XSA-447
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-447.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46837, XSA-447
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk2f-yqbb-nyd2
17
url VCID-rt5n-e4wq-p3gh
vulnerability_id VCID-rt5n-e4wq-p3gh
summary x86 HVM hypercalls may trigger Xen bug check
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46842
reference_id
reference_type
scores
0
value 0.02093
scoring_system epss
scoring_elements 0.84062
published_at 2026-04-21T12:55:00Z
1
value 0.02093
scoring_system epss
scoring_elements 0.83982
published_at 2026-04-02T12:55:00Z
2
value 0.02093
scoring_system epss
scoring_elements 0.84035
published_at 2026-04-13T12:55:00Z
3
value 0.02093
scoring_system epss
scoring_elements 0.84058
published_at 2026-04-16T12:55:00Z
4
value 0.02093
scoring_system epss
scoring_elements 0.84061
published_at 2026-04-18T12:55:00Z
5
value 0.02093
scoring_system epss
scoring_elements 0.83997
published_at 2026-04-04T12:55:00Z
6
value 0.02093
scoring_system epss
scoring_elements 0.84
published_at 2026-04-07T12:55:00Z
7
value 0.02093
scoring_system epss
scoring_elements 0.84023
published_at 2026-04-08T12:55:00Z
8
value 0.02093
scoring_system epss
scoring_elements 0.8403
published_at 2026-04-09T12:55:00Z
9
value 0.02093
scoring_system epss
scoring_elements 0.84047
published_at 2026-04-11T12:55:00Z
10
value 0.02093
scoring_system epss
scoring_elements 0.8404
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46842
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-454.html
reference_id advisory-454.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T18:23:20Z/
url https://xenbits.xenproject.org/xsa/advisory-454.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-454.html
reference_id XSA-454
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-454.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46842, XSA-454
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rt5n-e4wq-p3gh
18
url VCID-wd4s-jxuf-skbp
vulnerability_id VCID-wd4s-jxuf-skbp
summary x86/AMD: mismatch in IOMMU quarantine page table levels
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46835
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.2492
published_at 2026-04-21T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25096
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24955
published_at 2026-04-16T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-18T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-04T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24909
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24977
published_at 2026-04-08T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25022
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25036
published_at 2026-04-11T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24996
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46835
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
reference_id 1056928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
4
reference_url https://xenbits.xenproject.org/xsa/advisory-445.html
reference_id advisory-445.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-12T04:00:28Z/
url https://xenbits.xenproject.org/xsa/advisory-445.html
5
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
6
reference_url https://xenbits.xen.org/xsa/advisory-445.html
reference_id XSA-445
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-445.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2023-46835, XSA-445
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wd4s-jxuf-skbp
19
url VCID-wq5x-ptkj-cyaz
vulnerability_id VCID-wq5x-ptkj-cyaz
summary Mishandling of guest SSBD selection on AMD hardware
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42336
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16131
published_at 2026-04-21T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16143
published_at 2026-04-13T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16077
published_at 2026-04-16T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16092
published_at 2026-04-18T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16259
published_at 2026-04-02T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.1632
published_at 2026-04-04T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16118
published_at 2026-04-07T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16204
published_at 2026-04-08T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16269
published_at 2026-04-09T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16251
published_at 2026-04-11T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16211
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42336
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036298
reference_id 1036298
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036298
2
reference_url https://xenbits.xenproject.org/xsa/advisory-431.txt
reference_id advisory-431.txt
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T20:08:02Z/
url https://xenbits.xenproject.org/xsa/advisory-431.txt
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTO3U3WYLAZW3KLPKJZ332FYUREXPZMQ/
reference_id LTO3U3WYLAZW3KLPKJZ332FYUREXPZMQ
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-22T20:08:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LTO3U3WYLAZW3KLPKJZ332FYUREXPZMQ/
5
reference_url https://xenbits.xen.org/xsa/advisory-431.html
reference_id XSA-431
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-431.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2022-42336, XSA-431
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wq5x-ptkj-cyaz
20
url VCID-z9rm-9p2q-wfag
vulnerability_id VCID-z9rm-9p2q-wfag
summary x86: Incorrect logic for BTC/SRSO mitigations
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31142
reference_id
reference_type
scores
0
value 0.03118
scoring_system epss
scoring_elements 0.86856
published_at 2026-04-21T12:55:00Z
1
value 0.03118
scoring_system epss
scoring_elements 0.86839
published_at 2026-04-12T12:55:00Z
2
value 0.03118
scoring_system epss
scoring_elements 0.86835
published_at 2026-04-13T12:55:00Z
3
value 0.03118
scoring_system epss
scoring_elements 0.86852
published_at 2026-04-16T12:55:00Z
4
value 0.03118
scoring_system epss
scoring_elements 0.86789
published_at 2026-04-02T12:55:00Z
5
value 0.03118
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-04T12:55:00Z
6
value 0.03118
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-07T12:55:00Z
7
value 0.03118
scoring_system epss
scoring_elements 0.86821
published_at 2026-04-08T12:55:00Z
8
value 0.03118
scoring_system epss
scoring_elements 0.8683
published_at 2026-04-09T12:55:00Z
9
value 0.03118
scoring_system epss
scoring_elements 0.86843
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31142
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-455.html
reference_id advisory-455.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T13:51:28Z/
url https://xenbits.xenproject.org/xsa/advisory-455.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-455.html
reference_id XSA-455
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-455.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.17.4
purl pkg:ebuild/app-emulation/xen@4.17.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4
aliases CVE-2024-31142, XSA-455
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9rm-9p2q-wfag
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.17.4