Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/79061?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "type": "ebuild", "namespace": "app-emulation", "name": "xen", "version": "4.10.1-r2", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.12.0-r1", "latest_non_vulnerable_version": "4.17.4", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4148?format=api", "vulnerability_id": "VCID-5gua-j7zw-a7ex", "summary": "qemu may drive Xen into unbounded loop", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2018/05/08/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2018/05/08/3" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21661", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21516", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21694", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21664", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21885", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21771", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21744", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21687", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "reference_url": "http://www.securityfocus.com/bid/104149", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104149" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571881", "reference_id": "1571881", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571881" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10981", "reference_id": "CVE-2018-10981", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10981" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-262.html", "reference_id": "XSA-262", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-262.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-10981", "XSA-262" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5gua-j7zw-a7ex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=api", "vulnerability_id": "VCID-6jsn-7538-a7ha", "summary": "L1 Terminal Fault speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88182", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88242", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88241", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88254", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.8819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03877", "scoring_system": "epss", "scoring_elements": "0.88212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0398", "scoring_system": "epss", "scoring_elements": "0.88411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0398", "scoring_system": "epss", "scoring_elements": "0.88427", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3646" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005", "reference_id": "1585005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "reference_url": "https://security.archlinux.org/AVG-756", "reference_id": "AVG-756", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-756" }, { "reference_url": "https://security.archlinux.org/AVG-757", "reference_id": "AVG-757", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-757" }, { "reference_url": "https://security.archlinux.org/AVG-758", "reference_id": "AVG-758", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-758" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384", "reference_id": "RHSA-2018:2384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387", "reference_id": "RHSA-2018:2387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388", "reference_id": "RHSA-2018:2388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389", "reference_id": "RHSA-2018:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390", "reference_id": "RHSA-2018:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391", "reference_id": "RHSA-2018:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392", "reference_id": "RHSA-2018:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393", "reference_id": "RHSA-2018:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394", "reference_id": "RHSA-2018:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395", "reference_id": "RHSA-2018:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396", "reference_id": "RHSA-2018:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402", "reference_id": "RHSA-2018:2402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403", "reference_id": "RHSA-2018:2403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404", "reference_id": "RHSA-2018:2404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602", "reference_id": "RHSA-2018:2602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603", "reference_id": "RHSA-2018:2603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "reference_url": "https://usn.ubuntu.com/3740-1/", "reference_id": "USN-3740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3740-1/" }, { "reference_url": "https://usn.ubuntu.com/3740-2/", "reference_id": "USN-3740-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3740-2/" }, { "reference_url": "https://usn.ubuntu.com/3741-1/", "reference_id": "USN-3741-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3741-1/" }, { "reference_url": "https://usn.ubuntu.com/3741-2/", "reference_id": "USN-3741-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3741-2/" }, { "reference_url": "https://usn.ubuntu.com/3742-1/", "reference_id": "USN-3742-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3742-1/" }, { "reference_url": "https://usn.ubuntu.com/3742-2/", "reference_id": "USN-3742-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3742-2/" }, { "reference_url": "https://usn.ubuntu.com/3756-1/", "reference_id": "USN-3756-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3756-1/" }, { "reference_url": "https://usn.ubuntu.com/3823-1/", "reference_id": "USN-3823-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3823-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html", "reference_id": "XSA-273", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-273.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-3646", "XSA-273" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4159?format=api", "vulnerability_id": "VCID-7vn6-5h93-27hn", "summary": "L1 Terminal Fault speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02259", "scoring_system": "epss", "scoring_elements": "0.84661", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0232", "scoring_system": "epss", "scoring_elements": "0.84817", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86677", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.8667", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86689", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86637", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86656", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03037", "scoring_system": "epss", "scoring_elements": "0.86679", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005", "reference_id": "1585005", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1585005" }, { "reference_url": "https://security.archlinux.org/AVG-756", "reference_id": "AVG-756", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-756" }, { "reference_url": "https://security.archlinux.org/AVG-757", "reference_id": "AVG-757", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-757" }, { "reference_url": "https://security.archlinux.org/AVG-758", "reference_id": "AVG-758", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-758" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2384", "reference_id": "RHSA-2018:2384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2387", "reference_id": "RHSA-2018:2387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2388", "reference_id": "RHSA-2018:2388", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2389", "reference_id": "RHSA-2018:2389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2390", "reference_id": "RHSA-2018:2390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2391", "reference_id": "RHSA-2018:2391", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2392", "reference_id": "RHSA-2018:2392", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2393", "reference_id": "RHSA-2018:2393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2394", "reference_id": "RHSA-2018:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2395", "reference_id": "RHSA-2018:2395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2396", "reference_id": "RHSA-2018:2396", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2402", "reference_id": "RHSA-2018:2402", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2402" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2403", "reference_id": "RHSA-2018:2403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2404", "reference_id": "RHSA-2018:2404", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2404" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2602", "reference_id": "RHSA-2018:2602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2603", "reference_id": "RHSA-2018:2603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2603" }, { "reference_url": "https://usn.ubuntu.com/3740-1/", "reference_id": "USN-3740-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3740-1/" }, { "reference_url": "https://usn.ubuntu.com/3740-2/", "reference_id": "USN-3740-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3740-2/" }, { "reference_url": "https://usn.ubuntu.com/3741-1/", "reference_id": "USN-3741-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3741-1/" }, { "reference_url": "https://usn.ubuntu.com/3741-2/", "reference_id": "USN-3741-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3741-2/" }, { "reference_url": "https://usn.ubuntu.com/3742-1/", "reference_id": "USN-3742-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3742-1/" }, { "reference_url": "https://usn.ubuntu.com/3742-2/", "reference_id": "USN-3742-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3742-2/" }, { "reference_url": "https://usn.ubuntu.com/3823-1/", "reference_id": "USN-3823-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3823-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-273.html", "reference_id": "XSA-273", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-273.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-3620" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4142?format=api", "vulnerability_id": "VCID-8g31-68m7-b3ak", "summary": "grant table v2 -> v1 transition may crash Xen", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25963", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26046", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26087", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25923", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25974", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25984", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2594", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25865", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25835", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25771", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544459", "reference_id": "1544459", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544459" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-255.html", "reference_id": "XSA-255", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-255.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-7541", "XSA-255" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8g31-68m7-b3ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4139?format=api", "vulnerability_id": "VCID-9yjh-xh86-d7h8", "summary": "Information leak via side effects of speculative execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94332", "scoring_system": "epss", "scoring_elements": "0.99953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.94332", "scoring_system": "epss", "scoring_elements": "0.99954", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778", "reference_id": "1519778", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852", "reference_id": "886852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852" }, { "reference_url": "https://security.archlinux.org/AVG-557", "reference_id": "AVG-557", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-557" }, { "reference_url": "https://security.archlinux.org/AVG-558", "reference_id": "AVG-558", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-558" }, { "reference_url": "https://security.archlinux.org/AVG-559", "reference_id": "AVG-559", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-559" }, { "reference_url": "https://security.archlinux.org/AVG-987", "reference_id": "AVG-987", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-987" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0010", "reference_id": "RHSA-2018:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016", "reference_id": "RHSA-2018:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017", "reference_id": "RHSA-2018:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018", "reference_id": "RHSA-2018:0018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020", "reference_id": "RHSA-2018:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021", "reference_id": "RHSA-2018:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022", "reference_id": "RHSA-2018:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0151", "reference_id": "RHSA-2018:0151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0182", "reference_id": "RHSA-2018:0182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292", "reference_id": "RHSA-2018:0292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0464", "reference_id": "RHSA-2018:0464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0496", "reference_id": "RHSA-2018:0496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0512", "reference_id": "RHSA-2018:0512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0654", "reference_id": "RHSA-2018:0654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0654" }, { "reference_url": "https://usn.ubuntu.com/3516-1/", "reference_id": "USN-3516-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3516-1/" }, { "reference_url": "https://usn.ubuntu.com/3521-1/", "reference_id": "USN-3521-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3521-1/" }, { "reference_url": "https://usn.ubuntu.com/3530-1/", "reference_id": "USN-3530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3530-1/" }, { "reference_url": "https://usn.ubuntu.com/3540-1/", "reference_id": "USN-3540-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3540-1/" }, { "reference_url": "https://usn.ubuntu.com/3540-2/", "reference_id": "USN-3540-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3540-2/" }, { "reference_url": "https://usn.ubuntu.com/3541-1/", "reference_id": "USN-3541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3541-1/" }, { "reference_url": "https://usn.ubuntu.com/3541-2/", "reference_id": "USN-3541-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3541-2/" }, { "reference_url": "https://usn.ubuntu.com/3542-1/", "reference_id": "USN-3542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3542-1/" }, { "reference_url": "https://usn.ubuntu.com/3542-2/", "reference_id": "USN-3542-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3542-2/" }, { "reference_url": "https://usn.ubuntu.com/3549-1/", "reference_id": "USN-3549-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3549-1/" }, { "reference_url": "https://usn.ubuntu.com/3580-1/", "reference_id": "USN-3580-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3580-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-1/", "reference_id": "USN-3597-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3597-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-2/", "reference_id": "USN-3597-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3597-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html", "reference_id": "XSA-254", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-254.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2017-5753" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yjh-xh86-d7h8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4154?format=api", "vulnerability_id": "VCID-cuab-yybg-6uhs", "summary": "Use of v2 grant tables may cause crash on ARM", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.40002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.3999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.4", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39714", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610543", "reference_id": "1610543", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610543" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-268.html", "reference_id": "XSA-268", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-268.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-15469", "XSA-268" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cuab-yybg-6uhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4147?format=api", "vulnerability_id": "VCID-cvdk-37ua-3uck", "summary": "x86 vHPET interrupt injection errors", "references": [ { "reference_url": "http://openwall.com/lists/oss-security/2018/05/08/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2018/05/08/2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.20989", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21118", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21329", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21081", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21191", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21131", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "reference_url": "http://www.securityfocus.com/bid/104150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104150" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571880", "reference_id": "1571880", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1571880" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10982", "reference_id": "CVE-2018-10982", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10982" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-261.html", "reference_id": "XSA-261", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-261.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-10982", "XSA-261" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cvdk-37ua-3uck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4152?format=api", "vulnerability_id": "VCID-eutx-gmuf-gkeq", "summary": "libxl fails to honour readonly flag on HVM emulated SCSI disks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12892", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.85975", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86061", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86052", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.85986", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86031", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86045", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02771", "scoring_system": "epss", "scoring_elements": "0.86038", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12892" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4236" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/27/12", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2018/06/27/12" }, { "reference_url": "http://www.securityfocus.com/bid/104571", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104571" }, { "reference_url": "http://www.securitytracker.com/id/1041203", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041203" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-266.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-266.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590984", "reference_id": "1590984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590984" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12892", "reference_id": "CVE-2018-12892", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "9.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12892" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-266.html", "reference_id": "XSA-266", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-266.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-12892", "XSA-266" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "8.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eutx-gmuf-gkeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4145?format=api", "vulnerability_id": "VCID-fafv-creg-qfbt", "summary": "x86: PV guest may crash Xen with XPTI", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18234", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18305", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18331", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18313", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18396", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18448", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18293", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "reference_url": "http://www.securityfocus.com/bid/104003", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104003" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566220", "reference_id": "1566220", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566220" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10471", "reference_id": "CVE-2018-10471", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10471" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-259.html", "reference_id": "XSA-259", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-259.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-10471", "XSA-259" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fafv-creg-qfbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4151?format=api", "vulnerability_id": "VCID-mehs-bmad-pkds", "summary": "x86: #DB exception safety check can be triggered by a guest", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12893", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21576", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21434", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21604", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21612", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21582", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21804", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21555", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2169", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21701", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21606", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12893" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "reference_url": "https://support.citrix.com/article/CTX235748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX235748" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4236" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/27/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2018/06/27/11" }, { "reference_url": "http://www.securityfocus.com/bid/104572", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104572" }, { "reference_url": "http://www.securitytracker.com/id/1041202", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041202" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-265.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-265.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979", "reference_id": "1590979", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590979" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12893", "reference_id": "CVE-2018-12893", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12893" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-265.html", "reference_id": "XSA-265", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-265.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-12893", "XSA-265" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mehs-bmad-pkds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4150?format=api", "vulnerability_id": "VCID-nmg3-4zaj-zbaq", "summary": "preemption checks bypassed in x86 PV MM handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2208", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21931", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22122", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22117", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22237", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22284", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22068", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22203", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22224", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22123", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html" }, { "reference_url": "https://support.citrix.com/article/CTX235748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX235748" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4236", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4236" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2018/06/27/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2018/06/27/10" }, { "reference_url": "http://www.securityfocus.com/bid/104570", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104570" }, { "reference_url": "http://www.securitytracker.com/id/1041201", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041201" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-264.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590985", "reference_id": "1590985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590985" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12891", "reference_id": "CVE-2018-12891", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12891" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-264.html", "reference_id": "XSA-264", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-264.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-12891", "XSA-264" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmg3-4zaj-zbaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4141?format=api", "vulnerability_id": "VCID-rgt3-wkaw-eqca", "summary": "Information leak via side effects of speculative execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5754", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.87621", "scoring_system": "epss", "scoring_elements": "0.99463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.87621", "scoring_system": "epss", "scoring_elements": "0.9947", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.87621", "scoring_system": "epss", "scoring_elements": "0.99469", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.87621", "scoring_system": "epss", "scoring_elements": "0.99466", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.87621", "scoring_system": "epss", "scoring_elements": "0.99465", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.87752", "scoring_system": "epss", "scoring_elements": "0.99464", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.87752", "scoring_system": "epss", "scoring_elements": "0.99463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.87752", "scoring_system": "epss", "scoring_elements": "0.99462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.87752", "scoring_system": "epss", "scoring_elements": "0.99466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.87752", "scoring_system": "epss", "scoring_elements": "0.99467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.88229", "scoring_system": "epss", "scoring_elements": "0.99495", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.88802", "scoring_system": "epss", "scoring_elements": "0.99522", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:N/A:N" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781", "reference_id": "1519781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852", "reference_id": "886852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852" }, { "reference_url": "https://security.archlinux.org/ASA-201801-1", "reference_id": "ASA-201801-1", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-1" }, { "reference_url": "https://security.archlinux.org/ASA-201801-3", "reference_id": "ASA-201801-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-3" }, { "reference_url": "https://security.archlinux.org/ASA-201801-4", "reference_id": "ASA-201801-4", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-4" }, { "reference_url": "https://security.archlinux.org/ASA-201801-6", "reference_id": "ASA-201801-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-6" }, { "reference_url": "https://security.archlinux.org/AVG-552", "reference_id": "AVG-552", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-552" }, { "reference_url": "https://security.archlinux.org/AVG-571", "reference_id": "AVG-571", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-571" }, { "reference_url": "https://security.archlinux.org/AVG-574", "reference_id": "AVG-574", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-574" }, { "reference_url": "https://security.archlinux.org/AVG-577", "reference_id": "AVG-577", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-577" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0010", "reference_id": "RHSA-2018:0010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016", "reference_id": "RHSA-2018:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017", "reference_id": "RHSA-2018:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018", "reference_id": "RHSA-2018:0018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020", "reference_id": "RHSA-2018:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021", "reference_id": "RHSA-2018:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022", "reference_id": "RHSA-2018:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292", "reference_id": "RHSA-2018:0292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0464", "reference_id": "RHSA-2018:0464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129", "reference_id": "RHSA-2018:1129", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1129" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319", "reference_id": "RHSA-2018:1319", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346", "reference_id": "RHSA-2018:1346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1374", "reference_id": "RHSA-2018:1374", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1374" }, { "reference_url": "https://usn.ubuntu.com/3516-1/", "reference_id": "USN-3516-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3516-1/" }, { "reference_url": "https://usn.ubuntu.com/3522-1/", "reference_id": "USN-3522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3522-1/" }, { "reference_url": "https://usn.ubuntu.com/3522-2/", "reference_id": "USN-3522-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3522-2/" }, { "reference_url": "https://usn.ubuntu.com/3523-1/", "reference_id": "USN-3523-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3523-1/" }, { "reference_url": "https://usn.ubuntu.com/3523-2/", "reference_id": "USN-3523-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3523-2/" }, { "reference_url": "https://usn.ubuntu.com/3524-1/", "reference_id": "USN-3524-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3524-1/" }, { "reference_url": "https://usn.ubuntu.com/3524-2/", "reference_id": "USN-3524-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3524-2/" }, { "reference_url": "https://usn.ubuntu.com/3525-1/", "reference_id": "USN-3525-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3525-1/" }, { "reference_url": "https://usn.ubuntu.com/3540-1/", "reference_id": "USN-3540-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3540-1/" }, { "reference_url": "https://usn.ubuntu.com/3540-2/", "reference_id": "USN-3540-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3540-2/" }, { "reference_url": "https://usn.ubuntu.com/3541-1/", "reference_id": "USN-3541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3541-1/" }, { "reference_url": "https://usn.ubuntu.com/3541-2/", "reference_id": "USN-3541-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3541-2/" }, { "reference_url": "https://usn.ubuntu.com/3583-1/", "reference_id": "USN-3583-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3583-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-1/", "reference_id": "USN-3597-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3597-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-2/", "reference_id": "USN-3597-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3597-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html", "reference_id": "XSA-254", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-254.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2017-5754" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgt3-wkaw-eqca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4155?format=api", "vulnerability_id": "VCID-rn1h-xy8j-uqgs", "summary": "x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30206", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30285", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30102", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30162", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30198", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30201", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30123", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30106", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3006", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.2999", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610548", "reference_id": "1610548", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610548" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-269.html", "reference_id": "XSA-269", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-269.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-15468", "XSA-269" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rn1h-xy8j-uqgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4143?format=api", "vulnerability_id": "VCID-sqyq-m67p-z7cc", "summary": "x86 PVH guest without LAPIC may DoS the host", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16925", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1709", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1692", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17009", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16996", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16876", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16914", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16818", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544453", "reference_id": "1544453", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544453" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-256.html", "reference_id": "XSA-256", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-256.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-7542", "XSA-256" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqyq-m67p-z7cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4144?format=api", "vulnerability_id": "VCID-t5uz-r29w-nueq", "summary": "Information leak via crafted user-supplied CDROM", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25133", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.2497", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.2506", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25032", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25254", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25025", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25138", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25111", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25058", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25069", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4201" }, { "reference_url": "http://www.securityfocus.com/bid/104002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104002" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566253", "reference_id": "1566253", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566253" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10472", "reference_id": "CVE-2018-10472", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10472" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-258.html", "reference_id": "XSA-258", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-258.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-10472", "XSA-258" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5uz-r29w-nueq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=api", "vulnerability_id": "VCID-v8fp-rzfq-e3bs", "summary": "Information leak via side effects of speculative execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.88597", "scoring_system": "epss", "scoring_elements": "0.995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.88597", "scoring_system": "epss", "scoring_elements": "0.99501", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.99534", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.99529", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.9953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.89094", "scoring_system": "epss", "scoring_elements": "0.99533", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89147", "scoring_system": "epss", "scoring_elements": "0.99538", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99539", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.89198", "scoring_system": "epss", "scoring_elements": "0.99533", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:N/A:N" }, { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/102376", "reference_id": "102376", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.securityfocus.com/bid/102376" }, { "reference_url": "http://www.securitytracker.com/id/1040071", "reference_id": "1040071", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.securitytracker.com/id/1040071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780", "reference_id": "1519780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "reference_url": "https://www.kb.cert.org/vuls/id/180049", "reference_id": "180049", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jun/36", "reference_id": "36", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "reference_url": "https://www.exploit-db.com/exploits/43427/", "reference_id": "43427", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "reference_id": "4609", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "reference_id": "4611", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "reference_id": "4613", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "reference_url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "reference_id": "4614", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "reference_url": "http://www.kb.cert.org/vuls/id/584653", "reference_id": "584653", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532", "reference_id": "886532", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852", "reference_id": "886852", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "reference_id": "ADV180002", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-254.html", "reference_id": "advisory-254.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "reference_url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr", "reference_id": "advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr" }, { "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "reference_id": "ARUBA-PSA-2018-001.txt", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "reference_url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "reference_id": "ARUBA-PSA-2019-003.txt", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "reference_url": "https://security.archlinux.org/ASA-201801-10", "reference_id": "ASA-201801-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201801-10" }, { "reference_url": "https://security.archlinux.org/AVG-557", "reference_id": "AVG-557", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-557" }, { "reference_url": "https://security.archlinux.org/AVG-558", "reference_id": "AVG-558", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-558" }, { "reference_url": "https://security.archlinux.org/AVG-559", "reference_id": "AVG-559", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-559" }, { "reference_url": "https://security.archlinux.org/AVG-582", "reference_id": "AVG-582", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-582" }, { "reference_url": "https://security.archlinux.org/AVG-583", "reference_id": "AVG-583", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-583" }, { "reference_url": "https://security.archlinux.org/AVG-987", "reference_id": "AVG-987", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-987" }, { "reference_url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "reference_id": "AWS-2018-013", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel", "reference_id": "cisco-sa-20180104-cpusidechannel", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "reference_url": "https://support.citrix.com/article/CTX231399", "reference_id": "CTX231399", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.citrix.com/article/CTX231399" }, { "reference_url": "https://security.paloaltonetworks.com/CVE-2017-5715", "reference_id": "CVE-2017-5715", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.paloaltonetworks.com/CVE-2017-5715" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c", "reference_id": "CVE-2017-5753;CVE-2017-5715", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c" }, { "reference_url": "https://spectreattack.com/spectre.pdf", "reference_id": "CVE-2017-5753;CVE-2017-5715", "reference_type": "exploit", "scores": [], "url": "https://spectreattack.com/spectre.pdf" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "reference_id": "display?docId=emr_na-hpesbhf03805en_us", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us", "reference_id": "display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc", "reference_id": "FreeBSD-SA-18:03.speculative_execution.asc", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "reference_url": "https://security.gentoo.org/glsa/201804-08", "reference_id": "GLSA-201804-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-08" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://support.f5.com/csp/article/K91229003", "reference_id": "K91229003", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.f5.com/csp/article/K91229003" }, { "reference_url": "https://support.lenovo.com/us/en/solutions/LEN-18282", "reference_id": "LEN-18282", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "reference_url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "reference_id": "mitel-product-security-advisory-18-0001", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "reference_url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "reference_id": "mitigations-landing-new-class-timing-attack", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html", "reference_id": "msg00002.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html", "reference_id": "msg00004.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html", "reference_id": "msg00005.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html", "reference_id": "msg00009.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html", "reference_id": "msg00012.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html", "reference_id": "msg00013.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html", "reference_id": "msg00019.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html", "reference_id": "msg00025.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180104-0001/", "reference_id": "ntap-20180104-0001", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "reference_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "reference_id": "reading-privileged-memory-with-side.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0016", "reference_id": "RHSA-2018:0016", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0016" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0017", "reference_id": "RHSA-2018:0017", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0018", "reference_id": "RHSA-2018:0018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0020", "reference_id": "RHSA-2018:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0021", "reference_id": "RHSA-2018:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0022", "reference_id": "RHSA-2018:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0023", "reference_id": "RHSA-2018:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0027", "reference_id": "RHSA-2018:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0028", "reference_id": "RHSA-2018:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0292", "reference_id": "RHSA-2018:0292", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1062", "reference_id": "RHSA-2018:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1129", "reference_id": "RHSA-2018:1129", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1129" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1130", "reference_id": "RHSA-2018:1130", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1130" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1196", "reference_id": "RHSA-2018:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1216", "reference_id": "RHSA-2018:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1216" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1252", "reference_id": "RHSA-2018:1252", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1252" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1319", "reference_id": "RHSA-2018:1319", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1346", "reference_id": "RHSA-2018:1346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1967", "reference_id": "RHSA-2018:1967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "reference_url": "https://spectreattack.com/", "reference_id": "spectreattack.com", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://spectreattack.com/" }, { "reference_url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "reference_id": "Spectre-Information-Disclosure-Proof-Of-Concept.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "reference_url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "reference_id": "speculativeexecution", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "reference_url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "reference_id": "speculative-processor-vulnerability", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "reference_id": "ssa-608355.pdf", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "reference_url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "reference_id": "suse-addresses-meltdown-spectre-vulnerabilities", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "reference_url": "https://www.synology.com/support/security/Synology_SA_18_01", "reference_id": "Synology_SA_18_01", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "reference_url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "reference_id": "todays-cpu-vulnerability-what-you-need.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "reference_url": "https://usn.ubuntu.com/usn/usn-3516-1/", "reference_id": "usn-3516-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "reference_url": "https://usn.ubuntu.com/3516-1/", "reference_id": "USN-3516-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3516-1/" }, { "reference_url": "https://usn.ubuntu.com/3530-1/", "reference_id": "USN-3530-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3530-1/" }, { "reference_url": "https://usn.ubuntu.com/3531-1/", "reference_id": "USN-3531-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3531-1/" }, { "reference_url": "https://usn.ubuntu.com/3531-3/", "reference_id": "USN-3531-3", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3531-3/" }, { "reference_url": "https://usn.ubuntu.com/3540-1/", "reference_id": "USN-3540-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3540-1/" }, { "reference_url": "https://usn.ubuntu.com/3540-2/", "reference_id": "USN-3540-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3540-2/" }, { "reference_url": "https://usn.ubuntu.com/3541-1/", "reference_id": "USN-3541-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3541-1/" }, { "reference_url": "https://usn.ubuntu.com/3541-2/", "reference_id": "USN-3541-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3541-2/" }, { "reference_url": "https://usn.ubuntu.com/3542-1/", "reference_id": "USN-3542-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3542-1/" }, { "reference_url": "https://usn.ubuntu.com/3542-2/", "reference_id": "USN-3542-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3542-2/" }, { "reference_url": "https://usn.ubuntu.com/3549-1/", "reference_id": "USN-3549-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3549-1/" }, { "reference_url": "https://usn.ubuntu.com/3560-1/", "reference_id": "USN-3560-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3560-1/" }, { "reference_url": "https://usn.ubuntu.com/3561-1/", "reference_id": "USN-3561-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3561-1/" }, { "reference_url": "https://usn.ubuntu.com/3580-1/", "reference_id": "USN-3580-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3580-1/" }, { "reference_url": "https://usn.ubuntu.com/3581-1/", "reference_id": "USN-3581-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3581-1/" }, { "reference_url": "https://usn.ubuntu.com/3581-2/", "reference_id": "USN-3581-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3581-2/" }, { "reference_url": "https://usn.ubuntu.com/3582-1/", "reference_id": "USN-3582-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3582-1/" }, { "reference_url": "https://usn.ubuntu.com/3582-2/", "reference_id": "USN-3582-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3582-2/" }, { "reference_url": "https://usn.ubuntu.com/3594-1/", "reference_id": "USN-3594-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3594-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-1/", "reference_id": "USN-3597-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3597-1/" }, { "reference_url": "https://usn.ubuntu.com/3597-2/", "reference_id": "USN-3597-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3597-2/" }, { "reference_url": "https://usn.ubuntu.com/3620-2/", "reference_id": "USN-3620-2", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3620-2/" }, { "reference_url": "https://usn.ubuntu.com/3690-1/", "reference_id": "USN-3690-1", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3690-1/" }, { "reference_url": "https://usn.ubuntu.com/3777-3/", "reference_id": "USN-3777-3", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://usn.ubuntu.com/3777-3/" }, { "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-002", "reference_id": "vde-2018-002", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "reference_url": "https://cert.vde.com/en-us/advisories/vde-2018-003", "reference_id": "vde-2018-003", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "reference_id": "VMSA-2018-0002.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "reference_url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html", "reference_id": "VMSA-2018-0004.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html" }, { "reference_url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html", "reference_id": "VMSA-2018-0007.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/" } ], "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-254.html", "reference_id": "XSA-254", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-254.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2017-5715" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4137?format=api", "vulnerability_id": "VCID-x6ks-k1hc-27du", "summary": "DoS via non-preemptable L3/L4 pagetable freeing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25672", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25555", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25613", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25572", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29315", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29503", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29476", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2943", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544456", "reference_id": "1544456", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544456" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-252.html", "reference_id": "XSA-252", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-252.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-7540", "XSA-252" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x6ks-k1hc-27du" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4138?format=api", "vulnerability_id": "VCID-yaee-q1df-aqgm", "summary": "x86: memory leak with MSR emulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18378", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18446", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18455", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18476", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18469", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18602", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18604", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18505", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5244" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securityfocus.com/bid/102433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102433" }, { "reference_url": "http://www.securitytracker.com/id/1040774", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1040774" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528602", "reference_id": "1528602", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1528602" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5244", "reference_id": "CVE-2018-5244", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5244" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-253.html", "reference_id": "XSA-253", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-253.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-5244", "XSA-253" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yaee-q1df-aqgm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4158?format=api", "vulnerability_id": "VCID-yh4r-yysd-1ua5", "summary": "oxenstored does not apply quota-maxentity", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39828", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.40002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.3999", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.4", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39964", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00182", "scoring_system": "epss", "scoring_elements": "0.39714", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610552", "reference_id": "1610552", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1610552" }, { "reference_url": "https://security.gentoo.org/glsa/201810-06", "reference_id": "GLSA-201810-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201810-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-272.html", "reference_id": "XSA-272", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-272.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79061?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.10.1-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" } ], "aliases": [ "CVE-2018-15470", "XSA-272" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yh4r-yysd-1ua5" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.10.1-r2" }