Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen@4.15.0-r1
Typeebuild
Namespaceapp-emulation
Namexen
Version4.15.0-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.15.3
Latest_non_vulnerable_version4.17.4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1wgc-r96w-7kg9
vulnerability_id VCID-1wgc-r96w-7kg9
summary IRQ vector leak on x86
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3308
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18083
published_at 2026-04-24T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.1823
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18381
published_at 2026-04-02T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18435
published_at 2026-04-04T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18139
published_at 2026-04-07T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18223
published_at 2026-04-08T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18277
published_at 2026-04-09T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18279
published_at 2026-04-11T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18233
published_at 2026-04-12T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18181
published_at 2026-04-13T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-16T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18138
published_at 2026-04-18T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3308
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052
reference_id 981052
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052
4
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
5
reference_url https://xenbits.xen.org/xsa/advisory-360.html
reference_id XSA-360
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-360.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-3308, XSA-360
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1wgc-r96w-7kg9
1
url VCID-32w3-vmcb-wfd9
vulnerability_id VCID-32w3-vmcb-wfd9
summary xen/arm: Boot modules are not scrubbed
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28693
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18606
published_at 2026-04-24T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18781
published_at 2026-04-01T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18919
published_at 2026-04-02T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18972
published_at 2026-04-04T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18698
published_at 2026-04-07T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18778
published_at 2026-04-08T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18832
published_at 2026-04-09T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18837
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18791
published_at 2026-04-12T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18738
published_at 2026-04-13T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18688
published_at 2026-04-16T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.187
published_at 2026-04-18T12:55:00Z
12
value 0.0006
scoring_system epss
scoring_elements 0.18719
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28693
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
4
reference_url https://xenbits.xen.org/xsa/advisory-372.html
reference_id XSA-372
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-372.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-28693, XSA-372
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-32w3-vmcb-wfd9
2
url VCID-7519-7ws8-9keu
vulnerability_id VCID-7519-7ws8-9keu
summary Use after free triggered by block frontend in Linux blkback
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29569
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21304
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21321
published_at 2026-04-13T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21316
published_at 2026-04-16T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21324
published_at 2026-04-18T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.2146
published_at 2026-04-02T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21514
published_at 2026-04-04T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21266
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21345
published_at 2026-04-08T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21406
published_at 2026-04-09T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21414
published_at 2026-04-11T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21375
published_at 2026-04-12T12:55:00Z
11
value 0.00194
scoring_system epss
scoring_elements 0.41253
published_at 2026-04-21T12:55:00Z
12
value 0.00194
scoring_system epss
scoring_elements 0.41141
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29569
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
14
reference_url https://usn.ubuntu.com/4749-1/
reference_id USN-4749-1
reference_type
scores
url https://usn.ubuntu.com/4749-1/
15
reference_url https://usn.ubuntu.com/4750-1/
reference_id USN-4750-1
reference_type
scores
url https://usn.ubuntu.com/4750-1/
16
reference_url https://usn.ubuntu.com/4751-1/
reference_id USN-4751-1
reference_type
scores
url https://usn.ubuntu.com/4751-1/
17
reference_url https://usn.ubuntu.com/4876-1/
reference_id USN-4876-1
reference_type
scores
url https://usn.ubuntu.com/4876-1/
18
reference_url https://xenbits.xen.org/xsa/advisory-350.html
reference_id XSA-350
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-350.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29569, XSA-350
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7519-7ws8-9keu
3
url VCID-77st-3475-5kdr
vulnerability_id VCID-77st-3475-5kdr
summary HVM soft-reset crashes toolstack
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28687
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13922
published_at 2026-04-24T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13979
published_at 2026-04-01T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14057
published_at 2026-04-02T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.14111
published_at 2026-04-04T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13914
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13999
published_at 2026-04-08T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.14052
published_at 2026-04-09T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14006
published_at 2026-04-11T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13969
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.1392
published_at 2026-04-13T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13825
published_at 2026-04-16T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13818
published_at 2026-04-18T12:55:00Z
12
value 0.00045
scoring_system epss
scoring_elements 0.13889
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28687
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
4
reference_url https://xenbits.xen.org/xsa/advisory-368.html
reference_id XSA-368
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-368.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-28687, XSA-368
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-77st-3475-5kdr
4
url VCID-8r8y-8bq2-jufj
vulnerability_id VCID-8r8y-8bq2-jufj
summary oxenstored: permissions not checked on root node
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29479
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14314
published_at 2026-04-01T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14399
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14464
published_at 2026-04-04T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.1427
published_at 2026-04-07T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14353
published_at 2026-04-08T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14408
published_at 2026-04-09T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14358
published_at 2026-04-11T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14317
published_at 2026-04-12T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14262
published_at 2026-04-13T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14153
published_at 2026-04-16T12:55:00Z
10
value 0.00046
scoring_system epss
scoring_elements 0.14151
published_at 2026-04-18T12:55:00Z
11
value 0.00046
scoring_system epss
scoring_elements 0.14224
published_at 2026-04-21T12:55:00Z
12
value 0.00046
scoring_system epss
scoring_elements 0.14252
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29479
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
12
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
13
reference_url https://xenbits.xen.org/xsa/advisory-353.html
reference_id XSA-353
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-353.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29479, XSA-353
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8r8y-8bq2-jufj
5
url VCID-9hr5-p18q-7qb8
vulnerability_id VCID-9hr5-p18q-7qb8
summary FIFO event channels control structure ordering
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29571
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18173
published_at 2026-04-24T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18342
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18494
published_at 2026-04-02T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18548
published_at 2026-04-04T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18256
published_at 2026-04-07T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18339
published_at 2026-04-08T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18391
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18343
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18291
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18235
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18247
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18275
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29571
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
14
reference_url https://xenbits.xen.org/xsa/advisory-359.html
reference_id XSA-359
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-359.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29571, XSA-359
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hr5-p18q-7qb8
6
url VCID-bez2-h1zd-qqc4
vulnerability_id VCID-bez2-h1zd-qqc4
summary Guest triggered use-after-free in Linux xen-netback
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28691
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08799
published_at 2026-04-24T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08697
published_at 2026-04-01T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08725
published_at 2026-04-02T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08773
published_at 2026-04-04T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08699
published_at 2026-04-07T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08775
published_at 2026-04-08T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08801
published_at 2026-04-09T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08803
published_at 2026-04-11T12:55:00Z
8
value 0.00031
scoring_system epss
scoring_elements 0.0877
published_at 2026-04-12T12:55:00Z
9
value 0.00031
scoring_system epss
scoring_elements 0.08754
published_at 2026-04-13T12:55:00Z
10
value 0.00031
scoring_system epss
scoring_elements 0.08643
published_at 2026-04-16T12:55:00Z
11
value 0.00031
scoring_system epss
scoring_elements 0.08633
published_at 2026-04-18T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08786
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28691
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28691
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
4
reference_url https://usn.ubuntu.com/5015-1/
reference_id USN-5015-1
reference_type
scores
url https://usn.ubuntu.com/5015-1/
5
reference_url https://usn.ubuntu.com/5046-1/
reference_id USN-5046-1
reference_type
scores
url https://usn.ubuntu.com/5046-1/
6
reference_url https://usn.ubuntu.com/5050-1/
reference_id USN-5050-1
reference_type
scores
url https://usn.ubuntu.com/5050-1/
7
reference_url https://xenbits.xen.org/xsa/advisory-374.html
reference_id XSA-374
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-374.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-28691
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bez2-h1zd-qqc4
7
url VCID-c99h-krx4-t7a3
vulnerability_id VCID-c99h-krx4-t7a3
summary XAPI: guest-triggered excessive memory usage
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29487
reference_id
reference_type
scores
0
value 0.00367
scoring_system epss
scoring_elements 0.58645
published_at 2026-04-24T12:55:00Z
1
value 0.00367
scoring_system epss
scoring_elements 0.58554
published_at 2026-04-01T12:55:00Z
2
value 0.00367
scoring_system epss
scoring_elements 0.58638
published_at 2026-04-02T12:55:00Z
3
value 0.00367
scoring_system epss
scoring_elements 0.58659
published_at 2026-04-04T12:55:00Z
4
value 0.00367
scoring_system epss
scoring_elements 0.58626
published_at 2026-04-07T12:55:00Z
5
value 0.00367
scoring_system epss
scoring_elements 0.58677
published_at 2026-04-21T12:55:00Z
6
value 0.00367
scoring_system epss
scoring_elements 0.58684
published_at 2026-04-09T12:55:00Z
7
value 0.00367
scoring_system epss
scoring_elements 0.58702
published_at 2026-04-11T12:55:00Z
8
value 0.00367
scoring_system epss
scoring_elements 0.58683
published_at 2026-04-12T12:55:00Z
9
value 0.00367
scoring_system epss
scoring_elements 0.58663
published_at 2026-04-13T12:55:00Z
10
value 0.00367
scoring_system epss
scoring_elements 0.58696
published_at 2026-04-16T12:55:00Z
11
value 0.00367
scoring_system epss
scoring_elements 0.587
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29487
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
3
reference_url https://xenbits.xen.org/xsa/advisory-354.html
reference_id XSA-354
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-354.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29487
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c99h-krx4-t7a3
8
url VCID-d3ad-6tme-bfem
vulnerability_id VCID-d3ad-6tme-bfem
summary oxenstored: node ownership can be changed by unprivileged clients
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29486
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.18989
published_at 2026-04-01T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19124
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19176
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18893
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.18972
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19026
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19033
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18987
published_at 2026-04-12T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18935
published_at 2026-04-13T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18889
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18901
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18913
published_at 2026-04-21T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18804
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29486
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
12
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
13
reference_url https://xenbits.xen.org/xsa/advisory-352.html
reference_id XSA-352
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-352.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29486, XSA-352
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3ad-6tme-bfem
9
url VCID-e96u-uwba-kfg5
vulnerability_id VCID-e96u-uwba-kfg5
summary Speculative Code Store Bypass
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-26313
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23106
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23281
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23324
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23112
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23186
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23237
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23259
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23163
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.2318
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23172
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23133
published_at 2026-04-21T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.22958
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-26313
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
5
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
6
reference_url https://xenbits.xen.org/xsa/advisory-375.html
reference_id XSA-375
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-375.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-26313
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e96u-uwba-kfg5
10
url VCID-ex9v-p1au-n3ay
vulnerability_id VCID-ex9v-p1au-n3ay
summary Frontends can trigger OOM in Backends by update a watched path
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29568
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19759
published_at 2026-04-24T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19901
published_at 2026-04-01T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20046
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20105
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19833
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19913
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19967
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19986
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19942
published_at 2026-04-12T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19883
published_at 2026-04-13T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.1986
published_at 2026-04-16T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19865
published_at 2026-04-18T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19862
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29568
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
14
reference_url https://usn.ubuntu.com/4748-1/
reference_id USN-4748-1
reference_type
scores
url https://usn.ubuntu.com/4748-1/
15
reference_url https://usn.ubuntu.com/4749-1/
reference_id USN-4749-1
reference_type
scores
url https://usn.ubuntu.com/4749-1/
16
reference_url https://usn.ubuntu.com/4750-1/
reference_id USN-4750-1
reference_type
scores
url https://usn.ubuntu.com/4750-1/
17
reference_url https://usn.ubuntu.com/4751-1/
reference_id USN-4751-1
reference_type
scores
url https://usn.ubuntu.com/4751-1/
18
reference_url https://xenbits.xen.org/xsa/advisory-349.html
reference_id XSA-349
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-349.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29568, XSA-349
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex9v-p1au-n3ay
11
url VCID-h9c6-yw5r-v3ex
vulnerability_id VCID-h9c6-yw5r-v3ex
summary infinite loop when cleaning up IRQ vectors
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29567
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17091
published_at 2026-04-24T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17159
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17324
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17373
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17152
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17243
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17301
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17315
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17265
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17206
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17145
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17151
published_at 2026-04-18T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17186
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29567
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
4
reference_url https://xenbits.xen.org/xsa/advisory-356.html
reference_id XSA-356
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-356.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29567, XSA-356
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9c6-yw5r-v3ex
12
url VCID-hyup-47wa-pfac
vulnerability_id VCID-hyup-47wa-pfac
summary x86: TSX Async Abort protections not restored after S3
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28690
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.57968
published_at 2026-04-24T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57887
published_at 2026-04-01T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57971
published_at 2026-04-02T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.5799
published_at 2026-04-04T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-07T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58022
published_at 2026-04-08T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58024
published_at 2026-04-09T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58041
published_at 2026-04-11T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-12T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-13T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.58029
published_at 2026-04-16T12:55:00Z
11
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-18T12:55:00Z
12
value 0.00357
scoring_system epss
scoring_elements 0.58005
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28690
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
7
reference_url https://xenbits.xen.org/xsa/advisory-377.html
reference_id XSA-377
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-377.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-28690, XSA-377
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hyup-47wa-pfac
13
url VCID-k5j4-3xmv-a7bk
vulnerability_id VCID-k5j4-3xmv-a7bk
summary undue recursion in x86 HVM context switch code
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29566
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21446
published_at 2026-04-24T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21589
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21761
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21816
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21567
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21644
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21702
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21713
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21674
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21617
published_at 2026-04-13T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21616
published_at 2026-04-16T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21624
published_at 2026-04-18T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21593
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29566
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
14
reference_url https://xenbits.xen.org/xsa/advisory-348.html
reference_id XSA-348
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-348.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29566, XSA-348
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5j4-3xmv-a7bk
14
url VCID-knqd-zktw-cydm
vulnerability_id VCID-knqd-zktw-cydm
summary Speculative Code Store Bypass
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-0089
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17717
published_at 2026-04-24T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1783
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.17992
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18046
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17746
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17834
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17896
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17912
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17867
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17818
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.1776
published_at 2026-04-16T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.1777
published_at 2026-04-18T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17808
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-0089
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
7
reference_url https://xenbits.xen.org/xsa/advisory-375.html
reference_id XSA-375
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-375.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-0089, XSA-375
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-knqd-zktw-cydm
15
url VCID-n7pg-b7kc-wkew
vulnerability_id VCID-n7pg-b7kc-wkew
summary inappropriate x86 IOMMU timeout detection / handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28692
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10576
published_at 2026-04-24T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10461
published_at 2026-04-01T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10604
published_at 2026-04-02T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10666
published_at 2026-04-04T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.1053
published_at 2026-04-07T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10603
published_at 2026-04-08T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10662
published_at 2026-04-09T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10675
published_at 2026-04-11T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10643
published_at 2026-04-12T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10619
published_at 2026-04-13T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10484
published_at 2026-04-16T12:55:00Z
11
value 0.00036
scoring_system epss
scoring_elements 0.10502
published_at 2026-04-18T12:55:00Z
12
value 0.00036
scoring_system epss
scoring_elements 0.10627
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28692
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
7
reference_url https://xenbits.xen.org/xsa/advisory-373.html
reference_id XSA-373
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-373.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2021-28692, XSA-373
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7pg-b7kc-wkew
16
url VCID-ndz3-372h-8fhk
vulnerability_id VCID-ndz3-372h-8fhk
summary FIFO event channels control block related ordering
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29570
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18568
published_at 2026-04-24T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18744
published_at 2026-04-01T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.1888
published_at 2026-04-02T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18933
published_at 2026-04-04T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18656
published_at 2026-04-07T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18736
published_at 2026-04-08T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18789
published_at 2026-04-09T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18794
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18747
published_at 2026-04-12T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18697
published_at 2026-04-13T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18646
published_at 2026-04-16T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18657
published_at 2026-04-18T12:55:00Z
12
value 0.0006
scoring_system epss
scoring_elements 0.18676
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29570
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://security.gentoo.org/glsa/202107-30
reference_id GLSA-202107-30
reference_type
scores
url https://security.gentoo.org/glsa/202107-30
14
reference_url https://xenbits.xen.org/xsa/advisory-358.html
reference_id XSA-358
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-358.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.14.2-r1
purl pkg:ebuild/app-emulation/xen@4.14.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.14.2-r1
1
url pkg:ebuild/app-emulation/xen@4.15.0-r1
purl pkg:ebuild/app-emulation/xen@4.15.0-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1
aliases CVE-2020-29570, XSA-358
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ndz3-372h-8fhk
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.15.0-r1