Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen-tools@4.10.1-r2
Typeebuild
Namespaceapp-emulation
Namexen-tools
Version4.10.1-r2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.12.0-r1
Latest_non_vulnerable_version4.15.3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5gua-j7zw-a7ex
vulnerability_id VCID-5gua-j7zw-a7ex
summary qemu may drive Xen into unbounded loop
references
0
reference_url http://openwall.com/lists/oss-security/2018/05/08/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/05/08/3
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10981
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21661
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21516
published_at 2026-04-24T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21694
published_at 2026-04-18T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21664
published_at 2026-04-21T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21832
published_at 2026-04-02T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21885
published_at 2026-04-04T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21636
published_at 2026-04-07T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21713
published_at 2026-04-08T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21771
published_at 2026-04-09T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21783
published_at 2026-04-11T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21744
published_at 2026-04-12T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21687
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10981
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
9
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
10
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
11
reference_url https://www.debian.org/security/2018/dsa-4201
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4201
12
reference_url http://www.securityfocus.com/bid/104149
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104149
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1571881
reference_id 1571881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1571881
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10981
reference_id CVE-2018-10981
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10981
19
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
20
reference_url https://xenbits.xen.org/xsa/advisory-262.html
reference_id XSA-262
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-262.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-10981, XSA-262
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5gua-j7zw-a7ex
1
url VCID-6jsn-7538-a7ha
vulnerability_id VCID-6jsn-7538-a7ha
summary L1 Terminal Fault speculative side channel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3646
reference_id
reference_type
scores
0
value 0.03877
scoring_system epss
scoring_elements 0.88182
published_at 2026-04-01T12:55:00Z
1
value 0.03877
scoring_system epss
scoring_elements 0.88231
published_at 2026-04-08T12:55:00Z
2
value 0.03877
scoring_system epss
scoring_elements 0.88237
published_at 2026-04-09T12:55:00Z
3
value 0.03877
scoring_system epss
scoring_elements 0.88249
published_at 2026-04-11T12:55:00Z
4
value 0.03877
scoring_system epss
scoring_elements 0.88242
published_at 2026-04-12T12:55:00Z
5
value 0.03877
scoring_system epss
scoring_elements 0.88241
published_at 2026-04-13T12:55:00Z
6
value 0.03877
scoring_system epss
scoring_elements 0.88255
published_at 2026-04-16T12:55:00Z
7
value 0.03877
scoring_system epss
scoring_elements 0.88254
published_at 2026-04-18T12:55:00Z
8
value 0.03877
scoring_system epss
scoring_elements 0.8819
published_at 2026-04-02T12:55:00Z
9
value 0.03877
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-04T12:55:00Z
10
value 0.03877
scoring_system epss
scoring_elements 0.88212
published_at 2026-04-07T12:55:00Z
11
value 0.0398
scoring_system epss
scoring_elements 0.88411
published_at 2026-04-21T12:55:00Z
12
value 0.0398
scoring_system epss
scoring_elements 0.88427
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3646
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1585005
reference_id 1585005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1585005
9
reference_url https://security.archlinux.org/AVG-756
reference_id AVG-756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-756
10
reference_url https://security.archlinux.org/AVG-757
reference_id AVG-757
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-757
11
reference_url https://security.archlinux.org/AVG-758
reference_id AVG-758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-758
12
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
13
reference_url https://access.redhat.com/errata/RHSA-2018:2384
reference_id RHSA-2018:2384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2384
14
reference_url https://access.redhat.com/errata/RHSA-2018:2387
reference_id RHSA-2018:2387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2387
15
reference_url https://access.redhat.com/errata/RHSA-2018:2388
reference_id RHSA-2018:2388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2388
16
reference_url https://access.redhat.com/errata/RHSA-2018:2389
reference_id RHSA-2018:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2389
17
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
18
reference_url https://access.redhat.com/errata/RHSA-2018:2391
reference_id RHSA-2018:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2391
19
reference_url https://access.redhat.com/errata/RHSA-2018:2392
reference_id RHSA-2018:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2392
20
reference_url https://access.redhat.com/errata/RHSA-2018:2393
reference_id RHSA-2018:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2393
21
reference_url https://access.redhat.com/errata/RHSA-2018:2394
reference_id RHSA-2018:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2394
22
reference_url https://access.redhat.com/errata/RHSA-2018:2395
reference_id RHSA-2018:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2395
23
reference_url https://access.redhat.com/errata/RHSA-2018:2396
reference_id RHSA-2018:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2396
24
reference_url https://access.redhat.com/errata/RHSA-2018:2402
reference_id RHSA-2018:2402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2402
25
reference_url https://access.redhat.com/errata/RHSA-2018:2403
reference_id RHSA-2018:2403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2403
26
reference_url https://access.redhat.com/errata/RHSA-2018:2404
reference_id RHSA-2018:2404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2404
27
reference_url https://access.redhat.com/errata/RHSA-2018:2602
reference_id RHSA-2018:2602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2602
28
reference_url https://access.redhat.com/errata/RHSA-2018:2603
reference_id RHSA-2018:2603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2603
29
reference_url https://usn.ubuntu.com/3740-1/
reference_id USN-3740-1
reference_type
scores
url https://usn.ubuntu.com/3740-1/
30
reference_url https://usn.ubuntu.com/3740-2/
reference_id USN-3740-2
reference_type
scores
url https://usn.ubuntu.com/3740-2/
31
reference_url https://usn.ubuntu.com/3741-1/
reference_id USN-3741-1
reference_type
scores
url https://usn.ubuntu.com/3741-1/
32
reference_url https://usn.ubuntu.com/3741-2/
reference_id USN-3741-2
reference_type
scores
url https://usn.ubuntu.com/3741-2/
33
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
34
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
35
reference_url https://usn.ubuntu.com/3756-1/
reference_id USN-3756-1
reference_type
scores
url https://usn.ubuntu.com/3756-1/
36
reference_url https://usn.ubuntu.com/3823-1/
reference_id USN-3823-1
reference_type
scores
url https://usn.ubuntu.com/3823-1/
37
reference_url https://xenbits.xen.org/xsa/advisory-273.html
reference_id XSA-273
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-273.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-3646, XSA-273
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha
2
url VCID-7vn6-5h93-27hn
vulnerability_id VCID-7vn6-5h93-27hn
summary L1 Terminal Fault speculative side channel
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3620
reference_id
reference_type
scores
0
value 0.02259
scoring_system epss
scoring_elements 0.84661
published_at 2026-04-24T12:55:00Z
1
value 0.0232
scoring_system epss
scoring_elements 0.84817
published_at 2026-04-21T12:55:00Z
2
value 0.03037
scoring_system epss
scoring_elements 0.86607
published_at 2026-04-01T12:55:00Z
3
value 0.03037
scoring_system epss
scoring_elements 0.86677
published_at 2026-04-12T12:55:00Z
4
value 0.03037
scoring_system epss
scoring_elements 0.8667
published_at 2026-04-13T12:55:00Z
5
value 0.03037
scoring_system epss
scoring_elements 0.86683
published_at 2026-04-16T12:55:00Z
6
value 0.03037
scoring_system epss
scoring_elements 0.86689
published_at 2026-04-18T12:55:00Z
7
value 0.03037
scoring_system epss
scoring_elements 0.86618
published_at 2026-04-02T12:55:00Z
8
value 0.03037
scoring_system epss
scoring_elements 0.86638
published_at 2026-04-04T12:55:00Z
9
value 0.03037
scoring_system epss
scoring_elements 0.86637
published_at 2026-04-07T12:55:00Z
10
value 0.03037
scoring_system epss
scoring_elements 0.86656
published_at 2026-04-08T12:55:00Z
11
value 0.03037
scoring_system epss
scoring_elements 0.86665
published_at 2026-04-09T12:55:00Z
12
value 0.03037
scoring_system epss
scoring_elements 0.86679
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1585005
reference_id 1585005
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1585005
9
reference_url https://security.archlinux.org/AVG-756
reference_id AVG-756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-756
10
reference_url https://security.archlinux.org/AVG-757
reference_id AVG-757
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-757
11
reference_url https://security.archlinux.org/AVG-758
reference_id AVG-758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-758
12
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
13
reference_url https://access.redhat.com/errata/RHSA-2018:2384
reference_id RHSA-2018:2384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2384
14
reference_url https://access.redhat.com/errata/RHSA-2018:2387
reference_id RHSA-2018:2387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2387
15
reference_url https://access.redhat.com/errata/RHSA-2018:2388
reference_id RHSA-2018:2388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2388
16
reference_url https://access.redhat.com/errata/RHSA-2018:2389
reference_id RHSA-2018:2389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2389
17
reference_url https://access.redhat.com/errata/RHSA-2018:2390
reference_id RHSA-2018:2390
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2390
18
reference_url https://access.redhat.com/errata/RHSA-2018:2391
reference_id RHSA-2018:2391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2391
19
reference_url https://access.redhat.com/errata/RHSA-2018:2392
reference_id RHSA-2018:2392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2392
20
reference_url https://access.redhat.com/errata/RHSA-2018:2393
reference_id RHSA-2018:2393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2393
21
reference_url https://access.redhat.com/errata/RHSA-2018:2394
reference_id RHSA-2018:2394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2394
22
reference_url https://access.redhat.com/errata/RHSA-2018:2395
reference_id RHSA-2018:2395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2395
23
reference_url https://access.redhat.com/errata/RHSA-2018:2396
reference_id RHSA-2018:2396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2396
24
reference_url https://access.redhat.com/errata/RHSA-2018:2402
reference_id RHSA-2018:2402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2402
25
reference_url https://access.redhat.com/errata/RHSA-2018:2403
reference_id RHSA-2018:2403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2403
26
reference_url https://access.redhat.com/errata/RHSA-2018:2404
reference_id RHSA-2018:2404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2404
27
reference_url https://access.redhat.com/errata/RHSA-2018:2602
reference_id RHSA-2018:2602
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2602
28
reference_url https://access.redhat.com/errata/RHSA-2018:2603
reference_id RHSA-2018:2603
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2603
29
reference_url https://usn.ubuntu.com/3740-1/
reference_id USN-3740-1
reference_type
scores
url https://usn.ubuntu.com/3740-1/
30
reference_url https://usn.ubuntu.com/3740-2/
reference_id USN-3740-2
reference_type
scores
url https://usn.ubuntu.com/3740-2/
31
reference_url https://usn.ubuntu.com/3741-1/
reference_id USN-3741-1
reference_type
scores
url https://usn.ubuntu.com/3741-1/
32
reference_url https://usn.ubuntu.com/3741-2/
reference_id USN-3741-2
reference_type
scores
url https://usn.ubuntu.com/3741-2/
33
reference_url https://usn.ubuntu.com/3742-1/
reference_id USN-3742-1
reference_type
scores
url https://usn.ubuntu.com/3742-1/
34
reference_url https://usn.ubuntu.com/3742-2/
reference_id USN-3742-2
reference_type
scores
url https://usn.ubuntu.com/3742-2/
35
reference_url https://usn.ubuntu.com/3823-1/
reference_id USN-3823-1
reference_type
scores
url https://usn.ubuntu.com/3823-1/
36
reference_url https://xenbits.xen.org/xsa/advisory-273.html
reference_id XSA-273
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-273.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-3620
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn
3
url VCID-8g31-68m7-b3ak
vulnerability_id VCID-8g31-68m7-b3ak
summary grant table v2 -> v1 transition may crash Xen
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7541
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25963
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.26046
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26087
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25853
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25923
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25974
published_at 2026-04-09T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25984
published_at 2026-04-11T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.2594
published_at 2026-04-12T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.2588
published_at 2026-04-13T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25883
published_at 2026-04-16T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25865
published_at 2026-04-18T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-21T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25771
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544459
reference_id 1544459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544459
7
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
8
reference_url https://xenbits.xen.org/xsa/advisory-255.html
reference_id XSA-255
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-255.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-7541, XSA-255
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8g31-68m7-b3ak
4
url VCID-9yjh-xh86-d7h8
vulnerability_id VCID-9yjh-xh86-d7h8
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5753
reference_id
reference_type
scores
0
value 0.94332
scoring_system epss
scoring_elements 0.99953
published_at 2026-04-21T12:55:00Z
1
value 0.94332
scoring_system epss
scoring_elements 0.99954
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
46
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
47
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519778
reference_id 1519778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519778
48
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
49
reference_url https://security.archlinux.org/AVG-557
reference_id AVG-557
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-557
50
reference_url https://security.archlinux.org/AVG-558
reference_id AVG-558
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-558
51
reference_url https://security.archlinux.org/AVG-559
reference_id AVG-559
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-559
52
reference_url https://security.archlinux.org/AVG-987
reference_id AVG-987
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-987
53
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
54
reference_url https://access.redhat.com/errata/RHSA-2018:0010
reference_id RHSA-2018:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0010
55
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
56
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
57
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
58
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
59
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
60
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
61
reference_url https://access.redhat.com/errata/RHSA-2018:0151
reference_id RHSA-2018:0151
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0151
62
reference_url https://access.redhat.com/errata/RHSA-2018:0182
reference_id RHSA-2018:0182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0182
63
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0292
64
reference_url https://access.redhat.com/errata/RHSA-2018:0464
reference_id RHSA-2018:0464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0464
65
reference_url https://access.redhat.com/errata/RHSA-2018:0496
reference_id RHSA-2018:0496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0496
66
reference_url https://access.redhat.com/errata/RHSA-2018:0512
reference_id RHSA-2018:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0512
67
reference_url https://access.redhat.com/errata/RHSA-2018:0654
reference_id RHSA-2018:0654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0654
68
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
69
reference_url https://usn.ubuntu.com/3521-1/
reference_id USN-3521-1
reference_type
scores
url https://usn.ubuntu.com/3521-1/
70
reference_url https://usn.ubuntu.com/3530-1/
reference_id USN-3530-1
reference_type
scores
url https://usn.ubuntu.com/3530-1/
71
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
72
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
url https://usn.ubuntu.com/3540-2/
73
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
74
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
url https://usn.ubuntu.com/3541-2/
75
reference_url https://usn.ubuntu.com/3542-1/
reference_id USN-3542-1
reference_type
scores
url https://usn.ubuntu.com/3542-1/
76
reference_url https://usn.ubuntu.com/3542-2/
reference_id USN-3542-2
reference_type
scores
url https://usn.ubuntu.com/3542-2/
77
reference_url https://usn.ubuntu.com/3549-1/
reference_id USN-3549-1
reference_type
scores
url https://usn.ubuntu.com/3549-1/
78
reference_url https://usn.ubuntu.com/3580-1/
reference_id USN-3580-1
reference_type
scores
url https://usn.ubuntu.com/3580-1/
79
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
url https://usn.ubuntu.com/3597-1/
80
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
url https://usn.ubuntu.com/3597-2/
81
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2017-5753
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yjh-xh86-d7h8
5
url VCID-cuab-yybg-6uhs
vulnerability_id VCID-cuab-yybg-6uhs
summary Use of v2 grant tables may cause crash on ARM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15469
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39828
published_at 2026-04-01T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39974
published_at 2026-04-02T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.40002
published_at 2026-04-04T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39923
published_at 2026-04-07T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39976
published_at 2026-04-08T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-09T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.4
published_at 2026-04-11T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39964
published_at 2026-04-12T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39944
published_at 2026-04-13T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39994
published_at 2026-04-16T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39966
published_at 2026-04-18T12:55:00Z
11
value 0.00182
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-21T12:55:00Z
12
value 0.00182
scoring_system epss
scoring_elements 0.39714
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15469
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610543
reference_id 1610543
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610543
8
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
9
reference_url https://xenbits.xen.org/xsa/advisory-268.html
reference_id XSA-268
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-268.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-15469, XSA-268
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuab-yybg-6uhs
6
url VCID-cvdk-37ua-3uck
vulnerability_id VCID-cvdk-37ua-3uck
summary x86 vHPET interrupt injection errors
references
0
reference_url http://openwall.com/lists/oss-security/2018/05/08/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2018/05/08/2
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10982
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21125
published_at 2026-04-01T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.20989
published_at 2026-04-24T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.2114
published_at 2026-04-18T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-21T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21277
published_at 2026-04-02T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21329
published_at 2026-04-04T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21081
published_at 2026-04-07T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21162
published_at 2026-04-08T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21222
published_at 2026-04-09T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21233
published_at 2026-04-11T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21191
published_at 2026-04-12T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21138
published_at 2026-04-13T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21131
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10982
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
9
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
10
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
11
reference_url https://www.debian.org/security/2018/dsa-4201
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4201
12
reference_url http://www.securityfocus.com/bid/104150
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104150
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1571880
reference_id 1571880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1571880
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10982
reference_id CVE-2018-10982
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10982
19
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
20
reference_url https://xenbits.xen.org/xsa/advisory-261.html
reference_id XSA-261
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-261.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-10982, XSA-261
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cvdk-37ua-3uck
7
url VCID-eutx-gmuf-gkeq
vulnerability_id VCID-eutx-gmuf-gkeq
summary libxl fails to honour readonly flag on HVM emulated SCSI disks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12892
reference_id
reference_type
scores
0
value 0.02771
scoring_system epss
scoring_elements 0.85975
published_at 2026-04-01T12:55:00Z
1
value 0.02771
scoring_system epss
scoring_elements 0.86072
published_at 2026-04-24T12:55:00Z
2
value 0.02771
scoring_system epss
scoring_elements 0.86055
published_at 2026-04-16T12:55:00Z
3
value 0.02771
scoring_system epss
scoring_elements 0.86061
published_at 2026-04-18T12:55:00Z
4
value 0.02771
scoring_system epss
scoring_elements 0.86052
published_at 2026-04-21T12:55:00Z
5
value 0.02771
scoring_system epss
scoring_elements 0.85986
published_at 2026-04-02T12:55:00Z
6
value 0.02771
scoring_system epss
scoring_elements 0.86002
published_at 2026-04-07T12:55:00Z
7
value 0.02771
scoring_system epss
scoring_elements 0.86021
published_at 2026-04-08T12:55:00Z
8
value 0.02771
scoring_system epss
scoring_elements 0.86031
published_at 2026-04-09T12:55:00Z
9
value 0.02771
scoring_system epss
scoring_elements 0.86045
published_at 2026-04-11T12:55:00Z
10
value 0.02771
scoring_system epss
scoring_elements 0.86043
published_at 2026-04-12T12:55:00Z
11
value 0.02771
scoring_system epss
scoring_elements 0.86038
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12892
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.debian.org/security/2018/dsa-4236
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4236
7
reference_url http://www.openwall.com/lists/oss-security/2018/06/27/12
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2018/06/27/12
8
reference_url http://www.securityfocus.com/bid/104571
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104571
9
reference_url http://www.securitytracker.com/id/1041203
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041203
10
reference_url http://xenbits.xen.org/xsa/advisory-266.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-266.html
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590984
reference_id 1590984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590984
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12892
reference_id CVE-2018-12892
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 9.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12892
15
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
16
reference_url https://xenbits.xen.org/xsa/advisory-266.html
reference_id XSA-266
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-266.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-12892, XSA-266
risk_score 4.5
exploitability 0.5
weighted_severity 8.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eutx-gmuf-gkeq
8
url VCID-fafv-creg-qfbt
vulnerability_id VCID-fafv-creg-qfbt
summary x86: PV guest may crash Xen with XPTI
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10471
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18405
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18234
published_at 2026-04-24T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18305
published_at 2026-04-18T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18331
published_at 2026-04-21T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.1855
published_at 2026-04-02T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18605
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18313
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18396
published_at 2026-04-08T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18448
published_at 2026-04-11T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.184
published_at 2026-04-12T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18349
published_at 2026-04-13T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18293
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10471
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
8
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html
9
reference_url https://www.debian.org/security/2018/dsa-4201
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4201
10
reference_url http://www.securityfocus.com/bid/104003
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104003
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566220
reference_id 1566220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566220
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10471
reference_id CVE-2018-10471
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-10471
15
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
16
reference_url https://xenbits.xen.org/xsa/advisory-259.html
reference_id XSA-259
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-259.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-10471, XSA-259
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fafv-creg-qfbt
9
url VCID-mehs-bmad-pkds
vulnerability_id VCID-mehs-bmad-pkds
summary x86: #DB exception safety check can be triggered by a guest
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12893
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21576
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21434
published_at 2026-04-24T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21604
published_at 2026-04-16T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21612
published_at 2026-04-18T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21582
published_at 2026-04-21T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21749
published_at 2026-04-02T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21804
published_at 2026-04-04T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21555
published_at 2026-04-07T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21632
published_at 2026-04-08T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.2169
published_at 2026-04-09T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21701
published_at 2026-04-11T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21663
published_at 2026-04-12T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21606
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12893
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
7
reference_url https://support.citrix.com/article/CTX235748
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX235748
8
reference_url https://www.debian.org/security/2018/dsa-4236
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4236
9
reference_url http://www.openwall.com/lists/oss-security/2018/06/27/11
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2018/06/27/11
10
reference_url http://www.securityfocus.com/bid/104572
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104572
11
reference_url http://www.securitytracker.com/id/1041202
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041202
12
reference_url http://xenbits.xen.org/xsa/advisory-265.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-265.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590979
reference_id 1590979
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590979
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12893
reference_id CVE-2018-12893
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12893
17
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
18
reference_url https://xenbits.xen.org/xsa/advisory-265.html
reference_id XSA-265
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-265.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-12893, XSA-265
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mehs-bmad-pkds
10
url VCID-nmg3-4zaj-zbaq
vulnerability_id VCID-nmg3-4zaj-zbaq
summary preemption checks bypassed in x86 PV MM handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12891
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.2208
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.21931
published_at 2026-04-24T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22122
published_at 2026-04-16T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22117
published_at 2026-04-18T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22071
published_at 2026-04-21T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22237
published_at 2026-04-02T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22284
published_at 2026-04-04T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22068
published_at 2026-04-07T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22148
published_at 2026-04-08T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22203
published_at 2026-04-09T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-11T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22183
published_at 2026-04-12T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22123
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html
7
reference_url https://support.citrix.com/article/CTX235748
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX235748
8
reference_url https://www.debian.org/security/2018/dsa-4236
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4236
9
reference_url http://www.openwall.com/lists/oss-security/2018/06/27/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2018/06/27/10
10
reference_url http://www.securityfocus.com/bid/104570
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104570
11
reference_url http://www.securitytracker.com/id/1041201
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041201
12
reference_url http://xenbits.xen.org/xsa/advisory-264.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-264.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1590985
reference_id 1590985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1590985
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12891
reference_id CVE-2018-12891
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-12891
18
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
19
reference_url https://xenbits.xen.org/xsa/advisory-264.html
reference_id XSA-264
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-264.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-12891, XSA-264
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmg3-4zaj-zbaq
11
url VCID-rgt3-wkaw-eqca
vulnerability_id VCID-rgt3-wkaw-eqca
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5754
reference_id
reference_type
scores
0
value 0.87621
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-09T12:55:00Z
1
value 0.87621
scoring_system epss
scoring_elements 0.9947
published_at 2026-04-18T12:55:00Z
2
value 0.87621
scoring_system epss
scoring_elements 0.99469
published_at 2026-04-16T12:55:00Z
3
value 0.87621
scoring_system epss
scoring_elements 0.99466
published_at 2026-04-13T12:55:00Z
4
value 0.87621
scoring_system epss
scoring_elements 0.99465
published_at 2026-04-12T12:55:00Z
5
value 0.87752
scoring_system epss
scoring_elements 0.99464
published_at 2026-04-04T12:55:00Z
6
value 0.87752
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-01T12:55:00Z
7
value 0.87752
scoring_system epss
scoring_elements 0.99462
published_at 2026-04-02T12:55:00Z
8
value 0.87752
scoring_system epss
scoring_elements 0.99466
published_at 2026-04-07T12:55:00Z
9
value 0.87752
scoring_system epss
scoring_elements 0.99467
published_at 2026-04-08T12:55:00Z
10
value 0.88229
scoring_system epss
scoring_elements 0.99495
published_at 2026-04-21T12:55:00Z
11
value 0.88802
scoring_system epss
scoring_elements 0.99522
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
19
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519781
reference_id 1519781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519781
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
22
reference_url https://security.archlinux.org/ASA-201801-1
reference_id ASA-201801-1
reference_type
scores
url https://security.archlinux.org/ASA-201801-1
23
reference_url https://security.archlinux.org/ASA-201801-3
reference_id ASA-201801-3
reference_type
scores
url https://security.archlinux.org/ASA-201801-3
24
reference_url https://security.archlinux.org/ASA-201801-4
reference_id ASA-201801-4
reference_type
scores
url https://security.archlinux.org/ASA-201801-4
25
reference_url https://security.archlinux.org/ASA-201801-6
reference_id ASA-201801-6
reference_type
scores
url https://security.archlinux.org/ASA-201801-6
26
reference_url https://security.archlinux.org/AVG-552
reference_id AVG-552
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-552
27
reference_url https://security.archlinux.org/AVG-571
reference_id AVG-571
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-571
28
reference_url https://security.archlinux.org/AVG-574
reference_id AVG-574
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-574
29
reference_url https://security.archlinux.org/AVG-577
reference_id AVG-577
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-577
30
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
31
reference_url https://access.redhat.com/errata/RHSA-2018:0010
reference_id RHSA-2018:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0010
32
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
33
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
34
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
35
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
36
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
37
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
38
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0292
39
reference_url https://access.redhat.com/errata/RHSA-2018:0464
reference_id RHSA-2018:0464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0464
40
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
41
reference_url https://access.redhat.com/errata/RHSA-2018:1129
reference_id RHSA-2018:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1129
42
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
43
reference_url https://access.redhat.com/errata/RHSA-2018:1346
reference_id RHSA-2018:1346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1346
44
reference_url https://access.redhat.com/errata/RHSA-2018:1374
reference_id RHSA-2018:1374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1374
45
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
46
reference_url https://usn.ubuntu.com/3522-1/
reference_id USN-3522-1
reference_type
scores
url https://usn.ubuntu.com/3522-1/
47
reference_url https://usn.ubuntu.com/3522-2/
reference_id USN-3522-2
reference_type
scores
url https://usn.ubuntu.com/3522-2/
48
reference_url https://usn.ubuntu.com/3523-1/
reference_id USN-3523-1
reference_type
scores
url https://usn.ubuntu.com/3523-1/
49
reference_url https://usn.ubuntu.com/3523-2/
reference_id USN-3523-2
reference_type
scores
url https://usn.ubuntu.com/3523-2/
50
reference_url https://usn.ubuntu.com/3524-1/
reference_id USN-3524-1
reference_type
scores
url https://usn.ubuntu.com/3524-1/
51
reference_url https://usn.ubuntu.com/3524-2/
reference_id USN-3524-2
reference_type
scores
url https://usn.ubuntu.com/3524-2/
52
reference_url https://usn.ubuntu.com/3525-1/
reference_id USN-3525-1
reference_type
scores
url https://usn.ubuntu.com/3525-1/
53
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
54
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
url https://usn.ubuntu.com/3540-2/
55
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
56
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
url https://usn.ubuntu.com/3541-2/
57
reference_url https://usn.ubuntu.com/3583-1/
reference_id USN-3583-1
reference_type
scores
url https://usn.ubuntu.com/3583-1/
58
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
url https://usn.ubuntu.com/3597-1/
59
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
url https://usn.ubuntu.com/3597-2/
60
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2017-5754
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgt3-wkaw-eqca
12
url VCID-rn1h-xy8j-uqgs
vulnerability_id VCID-rn1h-xy8j-uqgs
summary x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15468
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.30206
published_at 2026-04-01T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30236
published_at 2026-04-02T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30285
published_at 2026-04-04T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30102
published_at 2026-04-07T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30162
published_at 2026-04-08T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30198
published_at 2026-04-09T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30201
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30157
published_at 2026-04-12T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30108
published_at 2026-04-13T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30123
published_at 2026-04-16T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.30106
published_at 2026-04-18T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.3006
published_at 2026-04-21T12:55:00Z
12
value 0.00115
scoring_system epss
scoring_elements 0.2999
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15468
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610548
reference_id 1610548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610548
9
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
10
reference_url https://xenbits.xen.org/xsa/advisory-269.html
reference_id XSA-269
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-269.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-15468, XSA-269
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rn1h-xy8j-uqgs
13
url VCID-sqyq-m67p-z7cc
vulnerability_id VCID-sqyq-m67p-z7cc
summary x86 PVH guest without LAPIC may DoS the host
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7542
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16925
published_at 2026-04-01T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.1709
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17144
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1692
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.17009
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17068
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17043
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16996
published_at 2026-04-12T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16936
published_at 2026-04-13T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16873
published_at 2026-04-16T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16876
published_at 2026-04-18T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16914
published_at 2026-04-21T12:55:00Z
12
value 0.00054
scoring_system epss
scoring_elements 0.16818
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7542
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544453
reference_id 1544453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544453
7
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
8
reference_url https://xenbits.xen.org/xsa/advisory-256.html
reference_id XSA-256
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-256.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-7542, XSA-256
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sqyq-m67p-z7cc
14
url VCID-t5uz-r29w-nueq
vulnerability_id VCID-t5uz-r29w-nueq
summary Information leak via crafted user-supplied CDROM
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10472
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25133
published_at 2026-04-01T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.2497
published_at 2026-04-24T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.2506
published_at 2026-04-18T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25032
published_at 2026-04-21T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25213
published_at 2026-04-02T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25254
published_at 2026-04-04T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25025
published_at 2026-04-07T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25094
published_at 2026-04-08T12:55:00Z
8
value 0.00088
scoring_system epss
scoring_elements 0.25138
published_at 2026-04-09T12:55:00Z
9
value 0.00088
scoring_system epss
scoring_elements 0.25153
published_at 2026-04-11T12:55:00Z
10
value 0.00088
scoring_system epss
scoring_elements 0.25111
published_at 2026-04-12T12:55:00Z
11
value 0.00088
scoring_system epss
scoring_elements 0.25058
published_at 2026-04-13T12:55:00Z
12
value 0.00088
scoring_system epss
scoring_elements 0.25069
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10472
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
8
reference_url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html
9
reference_url https://www.debian.org/security/2018/dsa-4201
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4201
10
reference_url http://www.securityfocus.com/bid/104002
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104002
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566253
reference_id 1566253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566253
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-10472
reference_id CVE-2018-10472
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-10472
15
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
16
reference_url https://xenbits.xen.org/xsa/advisory-258.html
reference_id XSA-258
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-258.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-10472, XSA-258
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5uz-r29w-nueq
15
url VCID-v8fp-rzfq-e3bs
vulnerability_id VCID-v8fp-rzfq-e3bs
summary Information leak via side effects of speculative execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
reference_id
reference_type
scores
0
value 0.88597
scoring_system epss
scoring_elements 0.995
published_at 2026-04-02T12:55:00Z
1
value 0.88597
scoring_system epss
scoring_elements 0.99501
published_at 2026-04-04T12:55:00Z
2
value 0.89094
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-18T12:55:00Z
3
value 0.89094
scoring_system epss
scoring_elements 0.99529
published_at 2026-04-09T12:55:00Z
4
value 0.89094
scoring_system epss
scoring_elements 0.9953
published_at 2026-04-13T12:55:00Z
5
value 0.89094
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-16T12:55:00Z
6
value 0.89147
scoring_system epss
scoring_elements 0.99538
published_at 2026-04-24T12:55:00Z
7
value 0.89198
scoring_system epss
scoring_elements 0.99534
published_at 2026-04-08T12:55:00Z
8
value 0.89198
scoring_system epss
scoring_elements 0.99539
published_at 2026-04-21T12:55:00Z
9
value 0.89198
scoring_system epss
scoring_elements 0.99533
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
61
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:N/A:N
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
62
reference_url http://www.securityfocus.com/bid/102376
reference_id 102376
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securityfocus.com/bid/102376
63
reference_url http://www.securitytracker.com/id/1040071
reference_id 1040071
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.securitytracker.com/id/1040071
64
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
reference_id 1519780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1519780
65
reference_url https://www.kb.cert.org/vuls/id/180049
reference_id 180049
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.kb.cert.org/vuls/id/180049
66
reference_url https://seclists.org/bugtraq/2019/Jun/36
reference_id 36
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://seclists.org/bugtraq/2019/Jun/36
67
reference_url https://www.exploit-db.com/exploits/43427/
reference_id 43427
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.exploit-db.com/exploits/43427/
68
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
reference_id 4609
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4609
69
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
reference_id 4611
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4611
70
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
reference_id 4613
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4613
71
reference_url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
reference_id 4614
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://nvidia.custhelp.com/app/answers/detail/a_id/4614
72
reference_url http://www.kb.cert.org/vuls/id/584653
reference_id 584653
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.kb.cert.org/vuls/id/584653
73
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
reference_id 886532
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532
74
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
reference_id 886852
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852
75
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
reference_id ADV180002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
76
reference_url http://xenbits.xen.org/xsa/advisory-254.html
reference_id advisory-254.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://xenbits.xen.org/xsa/advisory-254.html
77
reference_url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_id advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
78
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
reference_id ARUBA-PSA-2018-001.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
79
reference_url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
reference_id ARUBA-PSA-2019-003.txt
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
80
reference_url https://security.archlinux.org/ASA-201801-10
reference_id ASA-201801-10
reference_type
scores
url https://security.archlinux.org/ASA-201801-10
81
reference_url https://security.archlinux.org/AVG-557
reference_id AVG-557
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-557
82
reference_url https://security.archlinux.org/AVG-558
reference_id AVG-558
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-558
83
reference_url https://security.archlinux.org/AVG-559
reference_id AVG-559
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-559
84
reference_url https://security.archlinux.org/AVG-582
reference_id AVG-582
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-582
85
reference_url https://security.archlinux.org/AVG-583
reference_id AVG-583
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-583
86
reference_url https://security.archlinux.org/AVG-987
reference_id AVG-987
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-987
87
reference_url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
reference_id AWS-2018-013
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
88
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
reference_id cisco-sa-20180104-cpusidechannel
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
89
reference_url https://support.citrix.com/article/CTX231399
reference_id CTX231399
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.citrix.com/article/CTX231399
90
reference_url https://security.paloaltonetworks.com/CVE-2017-5715
reference_id CVE-2017-5715
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.paloaltonetworks.com/CVE-2017-5715
91
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c
92
reference_url https://spectreattack.com/spectre.pdf
reference_id CVE-2017-5753;CVE-2017-5715
reference_type exploit
scores
url https://spectreattack.com/spectre.pdf
93
reference_url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
reference_id display?docId=emr_na-hpesbhf03805en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
94
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_id display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
95
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
reference_id FreeBSD-SA-18:03.speculative_execution.asc
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
96
reference_url https://security.gentoo.org/glsa/201804-08
reference_id GLSA-201804-08
reference_type
scores
url https://security.gentoo.org/glsa/201804-08
97
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.gentoo.org/glsa/201810-06
98
reference_url https://support.f5.com/csp/article/K91229003
reference_id K91229003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.f5.com/csp/article/K91229003
99
reference_url https://support.lenovo.com/us/en/solutions/LEN-18282
reference_id LEN-18282
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://support.lenovo.com/us/en/solutions/LEN-18282
100
reference_url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
reference_id mitel-product-security-advisory-18-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
101
reference_url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
reference_id mitigations-landing-new-class-timing-attack
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
102
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
103
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
104
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
105
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
reference_id msg00005.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
106
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
reference_id msg00009.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
107
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
108
reference_url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
reference_id msg00013.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
109
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
110
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
111
reference_url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
112
reference_url https://security.netapp.com/advisory/ntap-20180104-0001/
reference_id ntap-20180104-0001
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.netapp.com/advisory/ntap-20180104-0001/
113
reference_url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
reference_id reading-privileged-memory-with-side.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
114
reference_url https://access.redhat.com/errata/RHSA-2018:0016
reference_id RHSA-2018:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0016
115
reference_url https://access.redhat.com/errata/RHSA-2018:0017
reference_id RHSA-2018:0017
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0017
116
reference_url https://access.redhat.com/errata/RHSA-2018:0018
reference_id RHSA-2018:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0018
117
reference_url https://access.redhat.com/errata/RHSA-2018:0020
reference_id RHSA-2018:0020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0020
118
reference_url https://access.redhat.com/errata/RHSA-2018:0021
reference_id RHSA-2018:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0021
119
reference_url https://access.redhat.com/errata/RHSA-2018:0022
reference_id RHSA-2018:0022
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0022
120
reference_url https://access.redhat.com/errata/RHSA-2018:0023
reference_id RHSA-2018:0023
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0023
121
reference_url https://access.redhat.com/errata/RHSA-2018:0027
reference_id RHSA-2018:0027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0027
122
reference_url https://access.redhat.com/errata/RHSA-2018:0028
reference_id RHSA-2018:0028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:0028
123
reference_url https://access.redhat.com/errata/RHSA-2018:0292
reference_id RHSA-2018:0292
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/errata/RHSA-2018:0292
124
reference_url https://access.redhat.com/errata/RHSA-2018:1062
reference_id RHSA-2018:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1062
125
reference_url https://access.redhat.com/errata/RHSA-2018:1129
reference_id RHSA-2018:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1129
126
reference_url https://access.redhat.com/errata/RHSA-2018:1130
reference_id RHSA-2018:1130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1130
127
reference_url https://access.redhat.com/errata/RHSA-2018:1196
reference_id RHSA-2018:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1196
128
reference_url https://access.redhat.com/errata/RHSA-2018:1216
reference_id RHSA-2018:1216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1216
129
reference_url https://access.redhat.com/errata/RHSA-2018:1252
reference_id RHSA-2018:1252
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1252
130
reference_url https://access.redhat.com/errata/RHSA-2018:1319
reference_id RHSA-2018:1319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1319
131
reference_url https://access.redhat.com/errata/RHSA-2018:1346
reference_id RHSA-2018:1346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1346
132
reference_url https://access.redhat.com/errata/RHSA-2018:1967
reference_id RHSA-2018:1967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:1967
133
reference_url https://spectreattack.com/
reference_id spectreattack.com
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://spectreattack.com/
134
reference_url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_id Spectre-Information-Disclosure-Proof-Of-Concept.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
135
reference_url https://access.redhat.com/security/vulnerabilities/speculativeexecution
reference_id speculativeexecution
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://access.redhat.com/security/vulnerabilities/speculativeexecution
136
reference_url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
reference_id speculative-processor-vulnerability
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
137
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
reference_id ssa-608355.pdf
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
138
reference_url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
reference_id suse-addresses-meltdown-spectre-vulnerabilities
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
139
reference_url https://www.synology.com/support/security/Synology_SA_18_01
reference_id Synology_SA_18_01
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.synology.com/support/security/Synology_SA_18_01
140
reference_url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
reference_id todays-cpu-vulnerability-what-you-need.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
141
reference_url https://usn.ubuntu.com/usn/usn-3516-1/
reference_id usn-3516-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/usn/usn-3516-1/
142
reference_url https://usn.ubuntu.com/3516-1/
reference_id USN-3516-1
reference_type
scores
url https://usn.ubuntu.com/3516-1/
143
reference_url https://usn.ubuntu.com/3530-1/
reference_id USN-3530-1
reference_type
scores
url https://usn.ubuntu.com/3530-1/
144
reference_url https://usn.ubuntu.com/3531-1/
reference_id USN-3531-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-1/
145
reference_url https://usn.ubuntu.com/3531-3/
reference_id USN-3531-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3531-3/
146
reference_url https://usn.ubuntu.com/3540-1/
reference_id USN-3540-1
reference_type
scores
url https://usn.ubuntu.com/3540-1/
147
reference_url https://usn.ubuntu.com/3540-2/
reference_id USN-3540-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3540-2/
148
reference_url https://usn.ubuntu.com/3541-1/
reference_id USN-3541-1
reference_type
scores
url https://usn.ubuntu.com/3541-1/
149
reference_url https://usn.ubuntu.com/3541-2/
reference_id USN-3541-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3541-2/
150
reference_url https://usn.ubuntu.com/3542-1/
reference_id USN-3542-1
reference_type
scores
url https://usn.ubuntu.com/3542-1/
151
reference_url https://usn.ubuntu.com/3542-2/
reference_id USN-3542-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3542-2/
152
reference_url https://usn.ubuntu.com/3549-1/
reference_id USN-3549-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3549-1/
153
reference_url https://usn.ubuntu.com/3560-1/
reference_id USN-3560-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3560-1/
154
reference_url https://usn.ubuntu.com/3561-1/
reference_id USN-3561-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3561-1/
155
reference_url https://usn.ubuntu.com/3580-1/
reference_id USN-3580-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3580-1/
156
reference_url https://usn.ubuntu.com/3581-1/
reference_id USN-3581-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-1/
157
reference_url https://usn.ubuntu.com/3581-2/
reference_id USN-3581-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3581-2/
158
reference_url https://usn.ubuntu.com/3582-1/
reference_id USN-3582-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-1/
159
reference_url https://usn.ubuntu.com/3582-2/
reference_id USN-3582-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3582-2/
160
reference_url https://usn.ubuntu.com/3594-1/
reference_id USN-3594-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3594-1/
161
reference_url https://usn.ubuntu.com/3597-1/
reference_id USN-3597-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-1/
162
reference_url https://usn.ubuntu.com/3597-2/
reference_id USN-3597-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3597-2/
163
reference_url https://usn.ubuntu.com/3620-2/
reference_id USN-3620-2
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3620-2/
164
reference_url https://usn.ubuntu.com/3690-1/
reference_id USN-3690-1
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3690-1/
165
reference_url https://usn.ubuntu.com/3777-3/
reference_id USN-3777-3
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://usn.ubuntu.com/3777-3/
166
reference_url https://cert.vde.com/en-us/advisories/vde-2018-002
reference_id vde-2018-002
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-002
167
reference_url https://cert.vde.com/en-us/advisories/vde-2018-003
reference_id vde-2018-003
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://cert.vde.com/en-us/advisories/vde-2018-003
168
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
reference_id VMSA-2018-0002.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
169
reference_url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
reference_id VMSA-2018-0004.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
170
reference_url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
reference_id VMSA-2018-0007.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/
url https://www.vmware.com/security/advisories/VMSA-2018-0007.html
171
reference_url https://xenbits.xen.org/xsa/advisory-254.html
reference_id XSA-254
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-254.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2017-5715
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs
16
url VCID-x6ks-k1hc-27du
vulnerability_id VCID-x6ks-k1hc-27du
summary DoS via non-preemptable L3/L4 pagetable freeing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-7540
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25601
published_at 2026-04-01T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25672
published_at 2026-04-02T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25713
published_at 2026-04-04T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25482
published_at 2026-04-07T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25555
published_at 2026-04-08T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25602
published_at 2026-04-09T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25613
published_at 2026-04-11T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25572
published_at 2026-04-12T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29315
published_at 2026-04-24T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29484
published_at 2026-04-13T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29503
published_at 2026-04-16T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29476
published_at 2026-04-18T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.2943
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-7540
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544456
reference_id 1544456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544456
7
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
8
reference_url https://xenbits.xen.org/xsa/advisory-252.html
reference_id XSA-252
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-252.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-7540, XSA-252
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6ks-k1hc-27du
17
url VCID-yaee-q1df-aqgm
vulnerability_id VCID-yaee-q1df-aqgm
summary x86: memory leak with MSR emulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-5244
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18557
published_at 2026-04-12T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18378
published_at 2026-04-24T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18446
published_at 2026-04-16T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18455
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18476
published_at 2026-04-21T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18697
published_at 2026-04-02T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18752
published_at 2026-04-04T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18469
published_at 2026-04-07T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18549
published_at 2026-04-08T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18602
published_at 2026-04-09T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18604
published_at 2026-04-11T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18505
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-5244
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.securityfocus.com/bid/102433
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102433
4
reference_url http://www.securitytracker.com/id/1040774
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040774
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1528602
reference_id 1528602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1528602
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-5244
reference_id CVE-2018-5244
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-5244
8
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
9
reference_url https://xenbits.xen.org/xsa/advisory-253.html
reference_id XSA-253
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-253.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-5244, XSA-253
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yaee-q1df-aqgm
18
url VCID-yh4r-yysd-1ua5
vulnerability_id VCID-yh4r-yysd-1ua5
summary oxenstored does not apply quota-maxentity
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-15470
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39828
published_at 2026-04-01T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39974
published_at 2026-04-02T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.40002
published_at 2026-04-04T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39923
published_at 2026-04-07T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39976
published_at 2026-04-08T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.3999
published_at 2026-04-09T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.4
published_at 2026-04-11T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39964
published_at 2026-04-12T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39944
published_at 2026-04-13T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39994
published_at 2026-04-16T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39966
published_at 2026-04-18T12:55:00Z
11
value 0.00182
scoring_system epss
scoring_elements 0.39888
published_at 2026-04-21T12:55:00Z
12
value 0.00182
scoring_system epss
scoring_elements 0.39714
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-15470
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1610552
reference_id 1610552
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1610552
8
reference_url https://security.gentoo.org/glsa/201810-06
reference_id GLSA-201810-06
reference_type
scores
url https://security.gentoo.org/glsa/201810-06
9
reference_url https://xenbits.xen.org/xsa/advisory-272.html
reference_id XSA-272
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-272.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
purl pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2
aliases CVE-2018-15470, XSA-272
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yh4r-yysd-1ua5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2