Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen@4.4.2-r1
Typeebuild
Namespaceapp-emulation
Namexen
Version4.4.2-r1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.6.0-r9
Latest_non_vulnerable_version4.17.4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2krx-ggcg-efaj
vulnerability_id VCID-2krx-ggcg-efaj
summary Vulnerabilities in HVM MSI injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3968.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3968.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3968
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59502
published_at 2026-04-01T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.59575
published_at 2026-04-02T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.596
published_at 2026-04-04T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59569
published_at 2026-04-07T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.5962
published_at 2026-04-08T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59633
published_at 2026-04-09T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59653
published_at 2026-04-11T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59636
published_at 2026-04-12T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59616
published_at 2026-04-13T12:55:00Z
9
value 0.00383
scoring_system epss
scoring_elements 0.5965
published_at 2026-04-16T12:55:00Z
10
value 0.00383
scoring_system epss
scoring_elements 0.59656
published_at 2026-04-18T12:55:00Z
11
value 0.00383
scoring_system epss
scoring_elements 0.5964
published_at 2026-04-21T12:55:00Z
12
value 0.00383
scoring_system epss
scoring_elements 0.5961
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3968
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3968
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102254
reference_id 1102254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102254
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
reference_id 757724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
5
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
6
reference_url https://xenbits.xen.org/xsa/advisory-96.html
reference_id XSA-96
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-96.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-3968
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2krx-ggcg-efaj
1
url VCID-2v7d-qp1d-tfac
vulnerability_id VCID-2v7d-qp1d-tfac
summary Information leak via internal x86 system device emulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2044.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2044.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2044
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23997
published_at 2026-04-01T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24122
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.2416
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.23941
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24007
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24054
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24072
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24029
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.23973
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.23983
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23971
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.23953
published_at 2026-04-21T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.23832
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2044
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195290
reference_id 1195290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195290
6
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
7
reference_url https://xenbits.xen.org/xsa/advisory-121.html
reference_id XSA-121
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-121.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-2044
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2v7d-qp1d-tfac
2
url VCID-4y3w-beqv-q7g5
vulnerability_id VCID-4y3w-beqv-q7g5
summary Information leak through version information hypercall
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2045.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2045.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2045
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22978
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.23022
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22813
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22887
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22939
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22958
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22921
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22865
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22879
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22873
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22834
published_at 2026-04-21T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.2267
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2045
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1195298
reference_id 1195298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1195298
6
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
7
reference_url https://xenbits.xen.org/xsa/advisory-122.html
reference_id XSA-122
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-122.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-2045
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4y3w-beqv-q7g5
3
url VCID-5u4v-s281-jkab
vulnerability_id VCID-5u4v-s281-jkab
summary Excessive checking in compatibility mode hypercall argument translation
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8866.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8866.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8866
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.25951
published_at 2026-04-24T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26154
published_at 2026-04-01T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26234
published_at 2026-04-02T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26275
published_at 2026-04-04T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26044
published_at 2026-04-07T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2611
published_at 2026-04-08T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26159
published_at 2026-04-09T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26168
published_at 2026-04-11T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26123
published_at 2026-04-12T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26064
published_at 2026-04-13T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.26067
published_at 2026-04-16T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.26046
published_at 2026-04-18T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.26012
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8866
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
9
reference_url http://secunia.com/advisories/59937
reference_id
reference_type
scores
url http://secunia.com/advisories/59937
10
reference_url http://secunia.com/advisories/62672
reference_id
reference_type
scores
url http://secunia.com/advisories/62672
11
reference_url http://support.citrix.com/article/CTX200288
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX200288
12
reference_url http://support.citrix.com/article/CTX201794
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX201794
13
reference_url http://www.debian.org/security/2015/dsa-3140
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3140
14
reference_url http://www.securityfocus.com/bid/71332
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71332
15
reference_url http://xenbits.xen.org/xsa/advisory-111.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-111.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1164253
reference_id 1164253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1164253
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8866
reference_id CVE-2014-8866
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-8866
50
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
51
reference_url https://xenbits.xen.org/xsa/advisory-111.html
reference_id XSA-111
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-111.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-8866
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5u4v-s281-jkab
4
url VCID-6bfh-5aed-mkcg
vulnerability_id VCID-6bfh-5aed-mkcg
summary Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9030.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9030.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9030
reference_id
reference_type
scores
0
value 0.01755
scoring_system epss
scoring_elements 0.82641
published_at 2026-04-24T12:55:00Z
1
value 0.01755
scoring_system epss
scoring_elements 0.82513
published_at 2026-04-01T12:55:00Z
2
value 0.01755
scoring_system epss
scoring_elements 0.82527
published_at 2026-04-02T12:55:00Z
3
value 0.01755
scoring_system epss
scoring_elements 0.82542
published_at 2026-04-04T12:55:00Z
4
value 0.01755
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-07T12:55:00Z
5
value 0.01755
scoring_system epss
scoring_elements 0.82565
published_at 2026-04-08T12:55:00Z
6
value 0.01755
scoring_system epss
scoring_elements 0.82573
published_at 2026-04-09T12:55:00Z
7
value 0.01755
scoring_system epss
scoring_elements 0.82591
published_at 2026-04-11T12:55:00Z
8
value 0.01755
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-12T12:55:00Z
9
value 0.01755
scoring_system epss
scoring_elements 0.82579
published_at 2026-04-13T12:55:00Z
10
value 0.01755
scoring_system epss
scoring_elements 0.82615
published_at 2026-04-16T12:55:00Z
11
value 0.01755
scoring_system epss
scoring_elements 0.82616
published_at 2026-04-18T12:55:00Z
12
value 0.01755
scoring_system epss
scoring_elements 0.8262
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9030
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
9
reference_url http://secunia.com/advisories/62672
reference_id
reference_type
scores
url http://secunia.com/advisories/62672
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98853
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98853
11
reference_url http://www.debian.org/security/2015/dsa-3140
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3140
12
reference_url http://www.securityfocus.com/bid/71207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71207
13
reference_url http://xenbits.xen.org/xsa/advisory-113.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-113.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1166913
reference_id 1166913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1166913
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9030
reference_id CVE-2014-9030
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-9030
52
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
53
reference_url https://xenbits.xen.org/xsa/advisory-113.html
reference_id XSA-113
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-113.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-9030
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bfh-5aed-mkcg
5
url VCID-amzk-38qt-6kdn
vulnerability_id VCID-amzk-38qt-6kdn
summary Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor
references
0
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2015-0783.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0783.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8867.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8867.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8867
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31723
published_at 2026-04-24T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31902
published_at 2026-04-01T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.3203
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.3207
published_at 2026-04-04T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31894
published_at 2026-04-07T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31946
published_at 2026-04-08T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31974
published_at 2026-04-09T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31978
published_at 2026-04-11T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31939
published_at 2026-04-16T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31905
published_at 2026-04-13T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31918
published_at 2026-04-18T12:55:00Z
11
value 0.00126
scoring_system epss
scoring_elements 0.3189
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8867
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
11
reference_url http://secunia.com/advisories/59949
reference_id
reference_type
scores
url http://secunia.com/advisories/59949
12
reference_url http://secunia.com/advisories/62672
reference_id
reference_type
scores
url http://secunia.com/advisories/62672
13
reference_url http://support.citrix.com/article/CTX200288
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX200288
14
reference_url http://support.citrix.com/article/CTX201794
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX201794
15
reference_url http://www.debian.org/security/2015/dsa-3140
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3140
16
reference_url http://www.securityfocus.com/bid/71331
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71331
17
reference_url http://xenbits.xenproject.org/xsa/advisory-112.html
reference_id
reference_type
scores
url http://xenbits.xenproject.org/xsa/advisory-112.html
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1164255
reference_id 1164255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1164255
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8867
reference_id CVE-2014-8867
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-8867
32
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
33
reference_url https://access.redhat.com/errata/RHSA-2015:0783
reference_id RHSA-2015:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0783
34
reference_url https://xenbits.xen.org/xsa/advisory-112.html
reference_id XSA-112
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-112.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-8867
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-amzk-38qt-6kdn
6
url VCID-b11f-3gfg-ukgd
vulnerability_id VCID-b11f-3gfg-ukgd
summary Certain domctl operations may be abused to lock up the host
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2751.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2751
reference_id
reference_type
scores
0
value 0.01427
scoring_system epss
scoring_elements 0.8058
published_at 2026-04-01T12:55:00Z
1
value 0.01427
scoring_system epss
scoring_elements 0.80587
published_at 2026-04-02T12:55:00Z
2
value 0.01427
scoring_system epss
scoring_elements 0.80609
published_at 2026-04-04T12:55:00Z
3
value 0.01427
scoring_system epss
scoring_elements 0.80602
published_at 2026-04-07T12:55:00Z
4
value 0.01427
scoring_system epss
scoring_elements 0.8063
published_at 2026-04-08T12:55:00Z
5
value 0.01427
scoring_system epss
scoring_elements 0.80639
published_at 2026-04-09T12:55:00Z
6
value 0.01427
scoring_system epss
scoring_elements 0.80655
published_at 2026-04-11T12:55:00Z
7
value 0.01427
scoring_system epss
scoring_elements 0.80642
published_at 2026-04-12T12:55:00Z
8
value 0.01427
scoring_system epss
scoring_elements 0.80634
published_at 2026-04-13T12:55:00Z
9
value 0.01427
scoring_system epss
scoring_elements 0.80663
published_at 2026-04-16T12:55:00Z
10
value 0.01427
scoring_system epss
scoring_elements 0.80665
published_at 2026-04-18T12:55:00Z
11
value 0.01427
scoring_system epss
scoring_elements 0.80667
published_at 2026-04-21T12:55:00Z
12
value 0.01427
scoring_system epss
scoring_elements 0.80691
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1203745
reference_id 1203745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1203745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781620
reference_id 781620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781620
5
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
6
reference_url https://xenbits.xen.org/xsa/advisory-127.html
reference_id XSA-127
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-127.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-2751
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b11f-3gfg-ukgd
7
url VCID-cyw1-5bg1-dfhb
vulnerability_id VCID-cyw1-5bg1-dfhb
summary p2m lock starvation
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9066.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9066.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9066
reference_id
reference_type
scores
0
value 0.00048
scoring_system epss
scoring_elements 0.14906
published_at 2026-04-01T12:55:00Z
1
value 0.00048
scoring_system epss
scoring_elements 0.14925
published_at 2026-04-08T12:55:00Z
2
value 0.00048
scoring_system epss
scoring_elements 0.14976
published_at 2026-04-09T12:55:00Z
3
value 0.00048
scoring_system epss
scoring_elements 0.1494
published_at 2026-04-11T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14902
published_at 2026-04-12T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14842
published_at 2026-04-13T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14955
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.15032
published_at 2026-04-04T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14836
published_at 2026-04-07T12:55:00Z
9
value 0.00108
scoring_system epss
scoring_elements 0.29033
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29785
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29738
published_at 2026-04-21T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.2966
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9066
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9066
5
reference_url http://www.openwall.com/lists/oss-security/2014/12/08/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/12/08/4
6
reference_url http://www.securityfocus.com/bid/71546
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71546
7
reference_url http://xenbits.xen.org/xsa/advisory-114.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-114.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1167951
reference_id 1167951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1167951
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9066
reference_id CVE-2014-9066
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-9066
13
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
14
reference_url https://xenbits.xen.org/xsa/advisory-114.html
reference_id XSA-114
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-114.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-9066
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cyw1-5bg1-dfhb
8
url VCID-f768-p44v-7fhk
vulnerability_id VCID-f768-p44v-7fhk
summary HVM qemu unexpectedly enabling emulated VGA graphics backends
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2152.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2152
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22639
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22813
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22857
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22648
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22723
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22774
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22795
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22757
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.227
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22717
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22667
published_at 2026-04-21T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.2251
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2152
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2152
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1200724
reference_id 1200724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1200724
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780975
reference_id 780975
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780975
5
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
6
reference_url https://xenbits.xen.org/xsa/advisory-119.html
reference_id XSA-119
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-119.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-2152
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f768-p44v-7fhk
9
url VCID-gapz-f86h-1kdm
vulnerability_id VCID-gapz-f86h-1kdm
summary Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3495.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-3495
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22803
published_at 2026-04-01T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22972
published_at 2026-04-02T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.23016
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22808
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22934
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22953
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22916
published_at 2026-04-12T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22859
published_at 2026-04-13T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22874
published_at 2026-04-16T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22867
published_at 2026-04-18T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.22828
published_at 2026-04-21T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22664
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-3495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=986302
reference_id 986302
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=986302
4
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
5
reference_url https://xenbits.xen.org/xsa/advisory-59.html
reference_id XSA-59
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-59.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2013-3495
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gapz-f86h-1kdm
10
url VCID-mfss-dr4n-fbgt
vulnerability_id VCID-mfss-dr4n-fbgt
summary xen crash due to use after free on hvm guest teardown
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148103.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148103.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148241.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148241.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0361.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0361.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0361
reference_id
reference_type
scores
0
value 0.01499
scoring_system epss
scoring_elements 0.81187
published_at 2026-04-24T12:55:00Z
1
value 0.01499
scoring_system epss
scoring_elements 0.81135
published_at 2026-04-12T12:55:00Z
2
value 0.01499
scoring_system epss
scoring_elements 0.81128
published_at 2026-04-13T12:55:00Z
3
value 0.01499
scoring_system epss
scoring_elements 0.81165
published_at 2026-04-21T12:55:00Z
4
value 0.01499
scoring_system epss
scoring_elements 0.81167
published_at 2026-04-18T12:55:00Z
5
value 0.01499
scoring_system epss
scoring_elements 0.81097
published_at 2026-04-07T12:55:00Z
6
value 0.01499
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-08T12:55:00Z
7
value 0.01499
scoring_system epss
scoring_elements 0.81131
published_at 2026-04-09T12:55:00Z
8
value 0.01499
scoring_system epss
scoring_elements 0.81149
published_at 2026-04-11T12:55:00Z
9
value 0.01747
scoring_system epss
scoring_elements 0.82484
published_at 2026-04-02T12:55:00Z
10
value 0.01747
scoring_system epss
scoring_elements 0.82502
published_at 2026-04-04T12:55:00Z
11
value 0.01747
scoring_system epss
scoring_elements 0.8247
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0361
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0361
7
reference_url http://www.securityfocus.com/bid/71882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71882
8
reference_url http://www.securitytracker.com/id/1031498
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031498
9
reference_url http://xenbits.xen.org/xsa/advisory-116.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-116.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1176097
reference_id 1176097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1176097
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776319
reference_id 776319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776319
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-0361
reference_id CVE-2015-0361
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-0361
27
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
28
reference_url https://xenbits.xen.org/xsa/advisory-116.html
reference_id XSA-116
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-116.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-0361
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfss-dr4n-fbgt
11
url VCID-n587-f4q9-87dy
vulnerability_id VCID-n587-f4q9-87dy
summary Insufficient restrictions on certain MMU update hypercalls
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8594.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8594.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8594
reference_id
reference_type
scores
0
value 0.01417
scoring_system epss
scoring_elements 0.80622
published_at 2026-04-24T12:55:00Z
1
value 0.01417
scoring_system epss
scoring_elements 0.80508
published_at 2026-04-01T12:55:00Z
2
value 0.01417
scoring_system epss
scoring_elements 0.80515
published_at 2026-04-02T12:55:00Z
3
value 0.01417
scoring_system epss
scoring_elements 0.80537
published_at 2026-04-04T12:55:00Z
4
value 0.01417
scoring_system epss
scoring_elements 0.80527
published_at 2026-04-07T12:55:00Z
5
value 0.01417
scoring_system epss
scoring_elements 0.80556
published_at 2026-04-08T12:55:00Z
6
value 0.01417
scoring_system epss
scoring_elements 0.80566
published_at 2026-04-09T12:55:00Z
7
value 0.01417
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-11T12:55:00Z
8
value 0.01417
scoring_system epss
scoring_elements 0.8057
published_at 2026-04-12T12:55:00Z
9
value 0.01417
scoring_system epss
scoring_elements 0.80562
published_at 2026-04-13T12:55:00Z
10
value 0.01417
scoring_system epss
scoring_elements 0.80591
published_at 2026-04-16T12:55:00Z
11
value 0.01417
scoring_system epss
scoring_elements 0.80593
published_at 2026-04-18T12:55:00Z
12
value 0.01417
scoring_system epss
scoring_elements 0.80596
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8594
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
9
reference_url http://secunia.com/advisories/62672
reference_id
reference_type
scores
url http://secunia.com/advisories/62672
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98767
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98767
11
reference_url http://www.debian.org/security/2015/dsa-3140
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3140
12
reference_url http://www.securityfocus.com/bid/71149
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71149
13
reference_url http://xenbits.xen.org/xsa/advisory-109.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-109.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1160664
reference_id 1160664
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1160664
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8594
reference_id CVE-2014-8594
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-8594
38
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
39
reference_url https://xenbits.xen.org/xsa/advisory-109.html
reference_id XSA-109
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-109.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-8594
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n587-f4q9-87dy
12
url VCID-p58r-1v6u-wyc5
vulnerability_id VCID-p58r-1v6u-wyc5
summary p2m lock starvation
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9065.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9065
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21555
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21676
published_at 2026-04-11T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21638
published_at 2026-04-12T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21581
published_at 2026-04-13T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21579
published_at 2026-04-16T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21725
published_at 2026-04-02T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-04T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21531
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21606
published_at 2026-04-08T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-09T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28447
published_at 2026-04-18T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28398
published_at 2026-04-21T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28283
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9065
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9065
5
reference_url http://www.openwall.com/lists/oss-security/2014/12/08/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/12/08/4
6
reference_url http://www.securityfocus.com/bid/71544
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71544
7
reference_url http://xenbits.xen.org/xsa/advisory-114.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-114.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1167951
reference_id 1167951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1167951
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9065
reference_id CVE-2014-9065
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-9065
13
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
14
reference_url https://xenbits.xen.org/xsa/advisory-114.html
reference_id XSA-114
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-114.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-9065
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p58r-1v6u-wyc5
13
url VCID-prt3-bjzf-9uca
vulnerability_id VCID-prt3-bjzf-9uca
summary Long latency MMIO mapping operations are not preemptible
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2752.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2752.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2752
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31252
published_at 2026-04-01T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31393
published_at 2026-04-02T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31435
published_at 2026-04-04T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31255
published_at 2026-04-07T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31307
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31338
published_at 2026-04-09T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31342
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31299
published_at 2026-04-12T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31256
published_at 2026-04-13T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3129
published_at 2026-04-16T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.3127
published_at 2026-04-18T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31242
published_at 2026-04-21T12:55:00Z
12
value 0.00122
scoring_system epss
scoring_elements 0.31069
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2752
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2752
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1203732
reference_id 1203732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1203732
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781620
reference_id 781620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781620
5
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
6
reference_url https://xenbits.xen.org/xsa/advisory-125.html
reference_id XSA-125
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-125.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-2752
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prt3-bjzf-9uca
14
url VCID-sv2q-enaa-7bfr
vulnerability_id VCID-sv2q-enaa-7bfr
summary Vulnerabilities in HVM MSI injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3967.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3967.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3967
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.48987
published_at 2026-04-01T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49023
published_at 2026-04-02T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49051
published_at 2026-04-04T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49004
published_at 2026-04-07T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49058
published_at 2026-04-08T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49055
published_at 2026-04-09T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49071
published_at 2026-04-11T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.49044
published_at 2026-04-12T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.4905
published_at 2026-04-13T12:55:00Z
9
value 0.00257
scoring_system epss
scoring_elements 0.49095
published_at 2026-04-16T12:55:00Z
10
value 0.00257
scoring_system epss
scoring_elements 0.49093
published_at 2026-04-18T12:55:00Z
11
value 0.00257
scoring_system epss
scoring_elements 0.49062
published_at 2026-04-21T12:55:00Z
12
value 0.00257
scoring_system epss
scoring_elements 0.49048
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3967
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3967
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102254
reference_id 1102254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102254
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
reference_id 757724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
5
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
6
reference_url https://xenbits.xen.org/xsa/advisory-96.html
reference_id XSA-96
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-96.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-3967
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sv2q-enaa-7bfr
15
url VCID-u9km-qptr-hqck
vulnerability_id VCID-u9km-qptr-hqck
summary Unmediated PCI command register access in qemu
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2756.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2756
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.3082
published_at 2026-04-01T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30949
published_at 2026-04-02T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30996
published_at 2026-04-04T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30813
published_at 2026-04-07T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30871
published_at 2026-04-08T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30901
published_at 2026-04-09T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30904
published_at 2026-04-11T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30862
published_at 2026-04-12T12:55:00Z
8
value 0.00119
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-13T12:55:00Z
9
value 0.00119
scoring_system epss
scoring_elements 0.30847
published_at 2026-04-16T12:55:00Z
10
value 0.00119
scoring_system epss
scoring_elements 0.30827
published_at 2026-04-18T12:55:00Z
11
value 0.00119
scoring_system epss
scoring_elements 0.30791
published_at 2026-04-21T12:55:00Z
12
value 0.00119
scoring_system epss
scoring_elements 0.30625
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2756
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1203737
reference_id 1203737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1203737
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781620
reference_id 781620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781620
8
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
9
reference_url https://usn.ubuntu.com/2608-1/
reference_id USN-2608-1
reference_type
scores
url https://usn.ubuntu.com/2608-1/
10
reference_url https://xenbits.xen.org/xsa/advisory-126.html
reference_id XSA-126
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-126.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2015-2756
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9km-qptr-hqck
16
url VCID-wumz-ff2x-dkg4
vulnerability_id VCID-wumz-ff2x-dkg4
summary Long latency virtual-mmu operations are not preemptible
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136981.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136981.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5149.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5149.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5149
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21196
published_at 2026-04-24T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21335
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21503
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21315
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21393
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21454
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21466
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21427
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21371
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21367
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21375
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21343
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5149
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95235
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95235
8
reference_url http://www.securityfocus.com/bid/69199
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69199
9
reference_url http://www.securitytracker.com/id/1030723
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030723
10
reference_url http://xenbits.xen.org/xsa/advisory-97.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-97.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1124350
reference_id 1124350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1124350
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5149
reference_id CVE-2014-5149
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-5149
23
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
24
reference_url https://xenbits.xen.org/xsa/advisory-97.html
reference_id XSA-97
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-97.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-5149
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wumz-ff2x-dkg4
17
url VCID-y1bk-hyme-uyek
vulnerability_id VCID-y1bk-hyme-uyek
summary Long latency virtual-mmu operations are not preemptible
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136980.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136981.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136981.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5146.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-5146
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21196
published_at 2026-04-24T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21335
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21503
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21315
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21393
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21454
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21466
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21427
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21371
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21367
published_at 2026-04-16T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21375
published_at 2026-04-18T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21343
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-5146
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/95234
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/95234
8
reference_url http://www.securityfocus.com/bid/69198
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69198
9
reference_url http://www.securitytracker.com/id/1030723
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030723
10
reference_url http://xenbits.xen.org/xsa/advisory-97.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-97.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1124350
reference_id 1124350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1124350
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-5146
reference_id CVE-2014-5146
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-5146
23
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
24
reference_url https://xenbits.xen.org/xsa/advisory-97.html
reference_id XSA-97
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-97.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-5146
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1bk-hyme-uyek
18
url VCID-y53n-bh1t-guhh
vulnerability_id VCID-y53n-bh1t-guhh
summary Excessive time to disable caching with HVM guests with PCI passthrough
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2212.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2212
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39176
published_at 2026-04-01T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39363
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-04T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39301
published_at 2026-04-07T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39356
published_at 2026-04-08T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39373
published_at 2026-04-09T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39385
published_at 2026-04-11T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39346
published_at 2026-04-12T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39327
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.3938
published_at 2026-04-16T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39351
published_at 2026-04-18T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39265
published_at 2026-04-21T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39049
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2212
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=986295
reference_id 986295
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=986295
4
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
5
reference_url https://xenbits.xen.org/xsa/advisory-60.html
reference_id XSA-60
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-60.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2013-2212
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y53n-bh1t-guhh
19
url VCID-znwm-cjxt-tqhe
vulnerability_id VCID-znwm-cjxt-tqhe
summary Missing privilege level checks in x86 emulation of far branches
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8595.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8595.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8595
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21456
published_at 2026-04-24T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21603
published_at 2026-04-01T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21776
published_at 2026-04-02T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21829
published_at 2026-04-04T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21582
published_at 2026-04-07T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21658
published_at 2026-04-08T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21716
published_at 2026-04-09T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21727
published_at 2026-04-11T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21689
published_at 2026-04-12T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21631
published_at 2026-04-13T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21629
published_at 2026-04-16T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21636
published_at 2026-04-18T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21605
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8595
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030
9
reference_url http://secunia.com/advisories/62537
reference_id
reference_type
scores
url http://secunia.com/advisories/62537
10
reference_url http://secunia.com/advisories/62672
reference_id
reference_type
scores
url http://secunia.com/advisories/62672
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/98768
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/98768
12
reference_url http://support.citrix.com/article/CTX200288
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX200288
13
reference_url http://support.citrix.com/article/CTX201794
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX201794
14
reference_url http://www.debian.org/security/2015/dsa-3140
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3140
15
reference_url http://www.securityfocus.com/bid/71151
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/71151
16
reference_url http://xenbits.xen.org/xsa/advisory-110.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-110.html
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1160643
reference_id 1160643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1160643
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
reference_id 770230
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8595
reference_id CVE-2014-8595
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8595
53
reference_url https://security.gentoo.org/glsa/201504-04
reference_id GLSA-201504-04
reference_type
scores
url https://security.gentoo.org/glsa/201504-04
54
reference_url https://xenbits.xen.org/xsa/advisory-110.html
reference_id XSA-110
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-110.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.4.2-r1
purl pkg:ebuild/app-emulation/xen@4.4.2-r1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1
aliases CVE-2014-8595
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-znwm-cjxt-tqhe
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.4.2-r1