Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/xen@4.16.6_pre1
Typeebuild
Namespaceapp-emulation
Namexen
Version4.16.6_pre1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.17.4
Latest_non_vulnerable_version4.17.4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2uap-2vm1-efcr
vulnerability_id VCID-2uap-2vm1-efcr
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29900
reference_id
reference_type
scores
0
value 0.01411
scoring_system epss
scoring_elements 0.80477
published_at 2026-04-02T12:55:00Z
1
value 0.01411
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-24T12:55:00Z
2
value 0.01411
scoring_system epss
scoring_elements 0.80527
published_at 2026-04-09T12:55:00Z
3
value 0.01411
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-11T12:55:00Z
4
value 0.01411
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-12T12:55:00Z
5
value 0.01411
scoring_system epss
scoring_elements 0.80523
published_at 2026-04-13T12:55:00Z
6
value 0.01411
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-16T12:55:00Z
7
value 0.01411
scoring_system epss
scoring_elements 0.80554
published_at 2026-04-18T12:55:00Z
8
value 0.01411
scoring_system epss
scoring_elements 0.80558
published_at 2026-04-21T12:55:00Z
9
value 0.01411
scoring_system epss
scoring_elements 0.80498
published_at 2026-04-04T12:55:00Z
10
value 0.01411
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-07T12:55:00Z
11
value 0.01411
scoring_system epss
scoring_elements 0.80517
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
17
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
reference_id 2090226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
19
reference_url https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
reference_id amd-sb-1037
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037
20
reference_url https://www.debian.org/security/2022/dsa-5207
reference_id dsa-5207
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.debian.org/security/2022/dsa-5207
21
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://security.gentoo.org/glsa/202402-07
22
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
reference_id MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
24
reference_url https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
reference_id retbleed-intel-and-amd-processor-information-disclosure-vulnerability
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/
url https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
25
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
26
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
27
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
28
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
29
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
30
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
31
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
32
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
33
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
34
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
35
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
36
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
37
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
38
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
39
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
40
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
41
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
42
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
43
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
44
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-29900
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr
1
url VCID-3d53-4qtr-myhm
vulnerability_id VCID-3d53-4qtr-myhm
summary x86 shadow plus log-dirty mode use-after-free
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42332
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.16081
published_at 2026-04-04T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16018
published_at 2026-04-02T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15878
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.1798
published_at 2026-04-24T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18115
published_at 2026-04-08T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18171
published_at 2026-04-09T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18177
published_at 2026-04-11T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.1813
published_at 2026-04-12T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18081
published_at 2026-04-13T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18024
published_at 2026-04-16T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18037
published_at 2026-04-18T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18071
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42332
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2023/03/21/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url http://www.openwall.com/lists/oss-security/2023/03/21/1
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
reference_id 1033297
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/
reference_id 5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/
10
reference_url http://xenbits.xen.org/xsa/advisory-427.html
reference_id advisory-427.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url http://xenbits.xen.org/xsa/advisory-427.html
11
reference_url https://xenbits.xenproject.org/xsa/advisory-427.txt
reference_id advisory-427.txt
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url https://xenbits.xenproject.org/xsa/advisory-427.txt
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/
reference_id APBMS2Q6746AXAFAITNJMGBNFGNMVLWR
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/
13
reference_url https://www.debian.org/security/2023/dsa-5378
reference_id dsa-5378
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url https://www.debian.org/security/2023/dsa-5378
14
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/
url https://security.gentoo.org/glsa/202402-07
15
reference_url https://xenbits.xen.org/xsa/advisory-427.html
reference_id XSA-427
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-427.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42332, XSA-427
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3d53-4qtr-myhm
2
url VCID-4ftz-k9rh-jubk
vulnerability_id VCID-4ftz-k9rh-jubk
summary x86 shadow paging arbitrary pointer dereference
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42335
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22707
published_at 2026-04-24T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23016
published_at 2026-04-02T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23061
published_at 2026-04-04T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.22851
published_at 2026-04-07T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22924
published_at 2026-04-08T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22976
published_at 2026-04-09T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22994
published_at 2026-04-11T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.22957
published_at 2026-04-12T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22901
published_at 2026-04-13T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22915
published_at 2026-04-16T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.2291
published_at 2026-04-18T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22873
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42335
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034842
reference_id 1034842
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034842
3
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
4
reference_url https://xenbits.xen.org/xsa/advisory-430.html
reference_id XSA-430
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-430.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42335, XSA-430
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ftz-k9rh-jubk
3
url VCID-5dbd-kz24-6fc1
vulnerability_id VCID-5dbd-kz24-6fc1
summary issues with partially successful P2M updates on x86
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28709
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24654
published_at 2026-04-24T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24807
published_at 2026-04-01T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24885
published_at 2026-04-02T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24925
published_at 2026-04-04T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.247
published_at 2026-04-07T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24767
published_at 2026-04-08T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24813
published_at 2026-04-09T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-11T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24787
published_at 2026-04-12T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24745
published_at 2026-04-16T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24737
published_at 2026-04-18T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24714
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28709
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-389.html
reference_id XSA-389
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-389.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28709, XSA-389
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5dbd-kz24-6fc1
4
url VCID-7d5b-66n7-zbe1
vulnerability_id VCID-7d5b-66n7-zbe1
summary x86/HVM pinned cache attributes mis-handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42333
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.61947
published_at 2026-04-07T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61946
published_at 2026-04-02T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.61978
published_at 2026-04-04T12:55:00Z
3
value 0.0051
scoring_system epss
scoring_elements 0.66431
published_at 2026-04-11T12:55:00Z
4
value 0.0051
scoring_system epss
scoring_elements 0.66418
published_at 2026-04-12T12:55:00Z
5
value 0.0051
scoring_system epss
scoring_elements 0.66388
published_at 2026-04-13T12:55:00Z
6
value 0.0051
scoring_system epss
scoring_elements 0.66424
published_at 2026-04-16T12:55:00Z
7
value 0.0051
scoring_system epss
scoring_elements 0.6644
published_at 2026-04-18T12:55:00Z
8
value 0.0051
scoring_system epss
scoring_elements 0.66426
published_at 2026-04-21T12:55:00Z
9
value 0.0051
scoring_system epss
scoring_elements 0.66449
published_at 2026-04-24T12:55:00Z
10
value 0.0051
scoring_system epss
scoring_elements 0.66396
published_at 2026-04-08T12:55:00Z
11
value 0.0051
scoring_system epss
scoring_elements 0.6641
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42333
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
reference_id 1033297
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
8
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
9
reference_url https://xenbits.xen.org/xsa/advisory-428.html
reference_id XSA-428
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-428.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42333, CVE-2022-43334, XSA-428
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d5b-66n7-zbe1
5
url VCID-7ek3-weqx-9fhs
vulnerability_id VCID-7ek3-weqx-9fhs
summary x86: Multiple speculative security issues
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23824
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.10821
published_at 2026-04-16T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.1263
published_at 2026-04-24T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12507
published_at 2026-04-18T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12621
published_at 2026-04-21T12:55:00Z
4
value 0.00048
scoring_system epss
scoring_elements 0.14768
published_at 2026-04-07T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14913
published_at 2026-04-09T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14874
published_at 2026-04-11T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14838
published_at 2026-04-12T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14779
published_at 2026-04-13T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14892
published_at 2026-04-02T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.14859
published_at 2026-04-08T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14967
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2119127
reference_id 2119127
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2119127
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-422.html
reference_id XSA-422
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-422.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-23824, XSA-422
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ek3-weqx-9fhs
6
url VCID-7etc-u5ya-zued
vulnerability_id VCID-7etc-u5ya-zued
summary IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26358
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31257
published_at 2026-04-24T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.3149
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31523
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31481
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31479
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-18T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26358
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://xenbits.xen.org/xsa/advisory-400.html
reference_id XSA-400
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-400.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-26358
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7etc-u5ya-zued
7
url VCID-7t5h-jy8h-t3d4
vulnerability_id VCID-7t5h-jy8h-t3d4
summary Xenstore: Cooperating guests can create arbitrary numbers of nodes
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42323
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09802
published_at 2026-04-09T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09727
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09776
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09681
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09752
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11254
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11455
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11393
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11255
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-24T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42323
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-419.html
reference_id XSA-419
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-419.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42323
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7t5h-jy8h-t3d4
8
url VCID-7ysh-usku-c3dz
vulnerability_id VCID-7ysh-usku-c3dz
summary x86/HVM pinned cache attributes mis-handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42334
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.1505
published_at 2026-04-07T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15179
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15246
published_at 2026-04-04T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18616
published_at 2026-04-11T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18569
published_at 2026-04-12T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18517
published_at 2026-04-13T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18458
published_at 2026-04-16T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18468
published_at 2026-04-18T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.1849
published_at 2026-04-21T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.1839
published_at 2026-04-24T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18561
published_at 2026-04-08T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18613
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42334
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
reference_id 1033297
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
8
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
9
reference_url https://xenbits.xen.org/xsa/advisory-428.html
reference_id XSA-428
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-428.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42334
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ysh-usku-c3dz
9
url VCID-8cb8-vq2c-q3e9
vulnerability_id VCID-8cb8-vq2c-q3e9
summary Xenstore: Guests can crash xenstored
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42309
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16825
published_at 2026-04-09T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16846
published_at 2026-04-02T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16902
published_at 2026-04-04T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16686
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16771
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18818
published_at 2026-04-16T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18965
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18918
published_at 2026-04-12T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18867
published_at 2026-04-13T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18831
published_at 2026-04-18T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19594
published_at 2026-04-24T12:55:00Z
11
value 0.00063
scoring_system epss
scoring_elements 0.19701
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42309
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-414.html
reference_id XSA-414
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-414.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42309, XSA-414
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cb8-vq2c-q3e9
10
url VCID-91hk-73kq-83g6
vulnerability_id VCID-91hk-73kq-83g6
summary lock order inversion in transitive grant copy handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33748
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11646
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11778
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11821
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11609
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11693
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11748
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11761
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11723
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11699
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.1156
published_at 2026-04-16T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11563
published_at 2026-04-18T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11686
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33748
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
reference_id 1021668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
25
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
26
reference_url https://xenbits.xen.org/xsa/advisory-411.html
reference_id XSA-411
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-411.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-33748, XSA-411
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-91hk-73kq-83g6
11
url VCID-9s43-gewn-bycc
vulnerability_id VCID-9s43-gewn-bycc
summary grant table v2 status pages may remain accessible after de-allocation (take two)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28703
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29143
published_at 2026-04-24T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29363
published_at 2026-04-01T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29433
published_at 2026-04-02T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.2948
published_at 2026-04-04T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29292
published_at 2026-04-07T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29356
published_at 2026-04-08T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29398
published_at 2026-04-09T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29401
published_at 2026-04-11T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29357
published_at 2026-04-12T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29304
published_at 2026-04-18T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29329
published_at 2026-04-16T12:55:00Z
11
value 0.0011
scoring_system epss
scoring_elements 0.29259
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28703
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
4
reference_url https://xenbits.xen.org/xsa/advisory-387.html
reference_id XSA-387
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-387.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28703, XSA-387
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9s43-gewn-bycc
12
url VCID-b7tb-ns1t-fyaw
vulnerability_id VCID-b7tb-ns1t-fyaw
summary IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26361
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31257
published_at 2026-04-24T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.3149
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31523
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31481
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31479
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-18T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26361
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://xenbits.xen.org/xsa/advisory-400.html
reference_id XSA-400
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-400.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-26361
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7tb-ns1t-fyaw
13
url VCID-bxae-85uh-uyek
vulnerability_id VCID-bxae-85uh-uyek
summary PoD operations on misaligned GFNs
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28708
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24781
published_at 2026-04-24T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24909
published_at 2026-04-12T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24855
published_at 2026-04-13T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24867
published_at 2026-04-16T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.2486
published_at 2026-04-18T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24838
published_at 2026-04-21T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24929
published_at 2026-04-01T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.25008
published_at 2026-04-02T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.25047
published_at 2026-04-04T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2482
published_at 2026-04-07T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-08T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24934
published_at 2026-04-09T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24949
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28708
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://xenbits.xenproject.org/xsa/advisory-388.txt
reference_id advisory-388.txt
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/
url https://xenbits.xenproject.org/xsa/advisory-388.txt
10
reference_url https://www.debian.org/security/2021/dsa-5017
reference_id dsa-5017
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/
url https://www.debian.org/security/2021/dsa-5017
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/
reference_id I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/
reference_id PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/
14
reference_url https://xenbits.xen.org/xsa/advisory-388.html
reference_id XSA-388
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-388.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28708
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bxae-85uh-uyek
14
url VCID-dfjm-gwzm-jqbt
vulnerability_id VCID-dfjm-gwzm-jqbt
summary Oxenstored 32->31 bit integer truncation issues
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42324
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.1015
published_at 2026-04-04T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10047
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10122
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10183
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10087
published_at 2026-04-02T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11591
published_at 2026-04-18T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11713
published_at 2026-04-21T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11671
published_at 2026-04-24T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.1179
published_at 2026-04-11T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11751
published_at 2026-04-12T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11726
published_at 2026-04-13T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11589
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42324
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-420.html
reference_id XSA-420
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-420.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42324, XSA-420
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfjm-gwzm-jqbt
15
url VCID-dgm4-ye4m-1fcq
vulnerability_id VCID-dgm4-ye4m-1fcq
summary Xenstore: Guests can get access to Xenstore nodes of deleted domains
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42320
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12428
published_at 2026-04-04T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12384
published_at 2026-04-02T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12359
published_at 2026-04-09T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12308
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12229
published_at 2026-04-07T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14067
published_at 2026-04-12T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14108
published_at 2026-04-11T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.13898
published_at 2026-04-18T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.13907
published_at 2026-04-16T12:55:00Z
9
value 0.00046
scoring_system epss
scoring_elements 0.14013
published_at 2026-04-13T12:55:00Z
10
value 0.00048
scoring_system epss
scoring_elements 0.1481
published_at 2026-04-24T12:55:00Z
11
value 0.00048
scoring_system epss
scoring_elements 0.14774
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42320
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url http://www.openwall.com/lists/oss-security/2022/11/01/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url http://www.openwall.com/lists/oss-security/2022/11/01/7
25
reference_url http://xenbits.xen.org/xsa/advisory-417.html
reference_id advisory-417.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url http://xenbits.xen.org/xsa/advisory-417.html
26
reference_url https://xenbits.xenproject.org/xsa/advisory-417.txt
reference_id advisory-417.txt
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://xenbits.xenproject.org/xsa/advisory-417.txt
27
reference_url https://www.debian.org/security/2022/dsa-5272
reference_id dsa-5272
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://www.debian.org/security/2022/dsa-5272
28
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://security.gentoo.org/glsa/202402-07
29
reference_url https://xenbits.xen.org/xsa/advisory-417.html
reference_id XSA-417
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-417.html
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
reference_id YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
reference_id YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
reference_id ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42320, XSA-417
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgm4-ye4m-1fcq
16
url VCID-dj1v-h79p-9ydz
vulnerability_id VCID-dj1v-h79p-9ydz
summary Racy interactions between dirty vram tracking and paging log dirty hypercalls
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26356
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14982
published_at 2026-04-24T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15105
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15172
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.14976
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15065
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15116
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15084
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15045
published_at 2026-04-12T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14985
published_at 2026-04-13T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14882
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14889
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.14943
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26356
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://xenbits.xen.org/xsa/advisory-397.html
reference_id XSA-397
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-397.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-26356, XSA-397
risk_score 1.7
exploitability 0.5
weighted_severity 3.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1v-h79p-9ydz
17
url VCID-eaz5-1yjy-cybd
vulnerability_id VCID-eaz5-1yjy-cybd
summary x86: unintended memory sharing between guests
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42327
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.0265
published_at 2026-04-12T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02663
published_at 2026-04-11T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02739
published_at 2026-04-24T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02748
published_at 2026-04-21T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02638
published_at 2026-04-18T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.0263
published_at 2026-04-16T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02647
published_at 2026-04-13T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05215
published_at 2026-04-07T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05164
published_at 2026-04-02T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05266
published_at 2026-04-09T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05248
published_at 2026-04-08T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05193
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42327
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url http://www.openwall.com/lists/oss-security/2022/11/01/3
reference_id 3
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url http://www.openwall.com/lists/oss-security/2022/11/01/3
3
reference_url http://xenbits.xen.org/xsa/advisory-412.html
reference_id advisory-412.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url http://xenbits.xen.org/xsa/advisory-412.html
4
reference_url https://xenbits.xenproject.org/xsa/advisory-412.txt
reference_id advisory-412.txt
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://xenbits.xenproject.org/xsa/advisory-412.txt
5
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://security.gentoo.org/glsa/202402-07
6
reference_url https://xenbits.xen.org/xsa/advisory-412.html
reference_id XSA-412
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-412.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
reference_id YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
reference_id ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T19:10:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42327, XSA-412
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eaz5-1yjy-cybd
18
url VCID-fekb-fbhz-y7g7
vulnerability_id VCID-fekb-fbhz-y7g7
summary PoD operations on misaligned GFNs
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28704
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24654
published_at 2026-04-24T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24807
published_at 2026-04-01T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24885
published_at 2026-04-02T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24925
published_at 2026-04-04T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.247
published_at 2026-04-07T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24767
published_at 2026-04-08T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24813
published_at 2026-04-09T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-11T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24787
published_at 2026-04-12T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24745
published_at 2026-04-16T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24737
published_at 2026-04-18T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24714
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28704
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-388.html
reference_id XSA-388
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-388.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28704, XSA-388
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fekb-fbhz-y7g7
19
url VCID-fhbs-3nvf-tbha
vulnerability_id VCID-fhbs-3nvf-tbha
summary Arm: unbounded memory consumption for 2nd-level page tables
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33747
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08339
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08391
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08312
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08376
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08392
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08384
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08365
published_at 2026-04-12T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08349
published_at 2026-04-13T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08242
published_at 2026-04-16T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08227
published_at 2026-04-18T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08388
published_at 2026-04-21T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.0836
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33747
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
reference_id 1021668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-409.html
reference_id XSA-409
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-409.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-33747, XSA-409
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhbs-3nvf-tbha
20
url VCID-gdsj-4cbx-ufep
vulnerability_id VCID-gdsj-4cbx-ufep
summary issues with partially successful P2M updates on x86
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28705
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.29944
published_at 2026-04-24T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30158
published_at 2026-04-09T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30195
published_at 2026-04-02T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30243
published_at 2026-04-04T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30063
published_at 2026-04-07T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30122
published_at 2026-04-08T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30161
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30119
published_at 2026-04-12T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30069
published_at 2026-04-13T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30082
published_at 2026-04-16T12:55:00Z
10
value 0.00115
scoring_system epss
scoring_elements 0.3006
published_at 2026-04-18T12:55:00Z
11
value 0.00115
scoring_system epss
scoring_elements 0.30014
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28705
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-389.html
reference_id XSA-389
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-389.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28705
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdsj-4cbx-ufep
21
url VCID-gj1u-mbaj-kyc5
vulnerability_id VCID-gj1u-mbaj-kyc5
summary Xenstore: Guests can create orphaned Xenstore nodes
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42310
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06106
published_at 2026-04-09T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06008
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06043
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06028
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06067
published_at 2026-04-08T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07039
published_at 2026-04-16T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07124
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07114
published_at 2026-04-12T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-13T12:55:00Z
9
value 0.00026
scoring_system epss
scoring_elements 0.07023
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07528
published_at 2026-04-24T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07566
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42310
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-415.html
reference_id XSA-415
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-415.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42310, XSA-415
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gj1u-mbaj-kyc5
22
url VCID-hsau-swt9-kyf7
vulnerability_id VCID-hsau-swt9-kyf7
summary Xenstore: Guests can cause Xenstore to not free temporary memory
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42319
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06792
published_at 2026-04-09T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06679
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06724
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06708
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06759
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.07834
published_at 2026-04-16T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.07948
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.07931
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.07918
published_at 2026-04-13T12:55:00Z
9
value 0.00028
scoring_system epss
scoring_elements 0.07818
published_at 2026-04-18T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08393
published_at 2026-04-24T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08423
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42319
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-416.html
reference_id XSA-416
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-416.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42319, XSA-416
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsau-swt9-kyf7
23
url VCID-hx7j-eymk-4ygk
vulnerability_id VCID-hx7j-eymk-4ygk
summary IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26359
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31257
published_at 2026-04-24T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.3149
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31523
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31481
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31479
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-18T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26359
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://xenbits.xen.org/xsa/advisory-400.html
reference_id XSA-400
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-400.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-26359
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7j-eymk-4ygk
24
url VCID-jwdv-qe4x-yfgw
vulnerability_id VCID-jwdv-qe4x-yfgw
summary race in VT-d domain ID cleanup
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26357
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.0517
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.05011
published_at 2026-04-02T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05039
published_at 2026-04-04T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05061
published_at 2026-04-07T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05094
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.05109
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.05083
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.05066
published_at 2026-04-12T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.05049
published_at 2026-04-13T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.04991
published_at 2026-04-16T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.04997
published_at 2026-04-18T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05143
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26357
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://xenbits.xen.org/xsa/advisory-399.html
reference_id XSA-399
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-399.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-26357, XSA-399
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwdv-qe4x-yfgw
25
url VCID-k133-xqmd-vqhr
vulnerability_id VCID-k133-xqmd-vqhr
summary x86: Cross-Thread Return Address Predictions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27672.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27672.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27672
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.31027
published_at 2026-04-02T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31074
published_at 2026-04-04T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.30892
published_at 2026-04-07T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.3095
published_at 2026-04-08T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30979
published_at 2026-04-09T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.30984
published_at 2026-04-11T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.30896
published_at 2026-04-13T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.30928
published_at 2026-04-16T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30907
published_at 2026-04-18T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30941
published_at 2026-04-12T12:55:00Z
10
value 0.00231
scoring_system epss
scoring_elements 0.45935
published_at 2026-04-21T12:55:00Z
11
value 0.00238
scoring_system epss
scoring_elements 0.46838
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27672
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031567
reference_id 1031567
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031567
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2174765
reference_id 2174765
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2174765
6
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
7
reference_url https://access.redhat.com/errata/RHSA-2023:7370
reference_id RHSA-2023:7370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7370
8
reference_url https://access.redhat.com/errata/RHSA-2023:7379
reference_id RHSA-2023:7379
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7379
9
reference_url https://usn.ubuntu.com/5978-1/
reference_id USN-5978-1
reference_type
scores
url https://usn.ubuntu.com/5978-1/
10
reference_url https://usn.ubuntu.com/6079-1/
reference_id USN-6079-1
reference_type
scores
url https://usn.ubuntu.com/6079-1/
11
reference_url https://usn.ubuntu.com/6080-1/
reference_id USN-6080-1
reference_type
scores
url https://usn.ubuntu.com/6080-1/
12
reference_url https://usn.ubuntu.com/6085-1/
reference_id USN-6085-1
reference_type
scores
url https://usn.ubuntu.com/6085-1/
13
reference_url https://usn.ubuntu.com/6090-1/
reference_id USN-6090-1
reference_type
scores
url https://usn.ubuntu.com/6090-1/
14
reference_url https://usn.ubuntu.com/6091-1/
reference_id USN-6091-1
reference_type
scores
url https://usn.ubuntu.com/6091-1/
15
reference_url https://usn.ubuntu.com/6096-1/
reference_id USN-6096-1
reference_type
scores
url https://usn.ubuntu.com/6096-1/
16
reference_url https://usn.ubuntu.com/6133-1/
reference_id USN-6133-1
reference_type
scores
url https://usn.ubuntu.com/6133-1/
17
reference_url https://usn.ubuntu.com/6134-1/
reference_id USN-6134-1
reference_type
scores
url https://usn.ubuntu.com/6134-1/
18
reference_url https://usn.ubuntu.com/6284-1/
reference_id USN-6284-1
reference_type
scores
url https://usn.ubuntu.com/6284-1/
19
reference_url https://usn.ubuntu.com/6301-1/
reference_id USN-6301-1
reference_type
scores
url https://usn.ubuntu.com/6301-1/
20
reference_url https://usn.ubuntu.com/6312-1/
reference_id USN-6312-1
reference_type
scores
url https://usn.ubuntu.com/6312-1/
21
reference_url https://usn.ubuntu.com/6314-1/
reference_id USN-6314-1
reference_type
scores
url https://usn.ubuntu.com/6314-1/
22
reference_url https://usn.ubuntu.com/6331-1/
reference_id USN-6331-1
reference_type
scores
url https://usn.ubuntu.com/6331-1/
23
reference_url https://usn.ubuntu.com/6337-1/
reference_id USN-6337-1
reference_type
scores
url https://usn.ubuntu.com/6337-1/
24
reference_url https://usn.ubuntu.com/6385-1/
reference_id USN-6385-1
reference_type
scores
url https://usn.ubuntu.com/6385-1/
25
reference_url https://usn.ubuntu.com/6396-1/
reference_id USN-6396-1
reference_type
scores
url https://usn.ubuntu.com/6396-1/
26
reference_url https://usn.ubuntu.com/6396-2/
reference_id USN-6396-2
reference_type
scores
url https://usn.ubuntu.com/6396-2/
27
reference_url https://usn.ubuntu.com/6396-3/
reference_id USN-6396-3
reference_type
scores
url https://usn.ubuntu.com/6396-3/
28
reference_url https://xenbits.xen.org/xsa/advisory-426.html
reference_id XSA-426
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-426.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-27672, XSA-426
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k133-xqmd-vqhr
26
url VCID-kw9v-ery2-sffr
vulnerability_id VCID-kw9v-ery2-sffr
summary Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29901
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22224
published_at 2026-04-02T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22272
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22055
published_at 2026-04-07T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22136
published_at 2026-04-08T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.2219
published_at 2026-04-09T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22211
published_at 2026-04-11T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22171
published_at 2026-04-12T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-13T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.2211
published_at 2026-04-16T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22104
published_at 2026-04-18T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22058
published_at 2026-04-21T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.21918
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29901
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103148
reference_id 2103148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103148
12
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
13
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
14
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
15
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
16
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
17
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
18
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
19
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
20
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
21
reference_url https://usn.ubuntu.com/5564-1/
reference_id USN-5564-1
reference_type
scores
url https://usn.ubuntu.com/5564-1/
22
reference_url https://usn.ubuntu.com/5565-1/
reference_id USN-5565-1
reference_type
scores
url https://usn.ubuntu.com/5565-1/
23
reference_url https://usn.ubuntu.com/5566-1/
reference_id USN-5566-1
reference_type
scores
url https://usn.ubuntu.com/5566-1/
24
reference_url https://usn.ubuntu.com/5728-1/
reference_id USN-5728-1
reference_type
scores
url https://usn.ubuntu.com/5728-1/
25
reference_url https://usn.ubuntu.com/5728-2/
reference_id USN-5728-2
reference_type
scores
url https://usn.ubuntu.com/5728-2/
26
reference_url https://usn.ubuntu.com/5728-3/
reference_id USN-5728-3
reference_type
scores
url https://usn.ubuntu.com/5728-3/
27
reference_url https://usn.ubuntu.com/5854-1/
reference_id USN-5854-1
reference_type
scores
url https://usn.ubuntu.com/5854-1/
28
reference_url https://usn.ubuntu.com/5861-1/
reference_id USN-5861-1
reference_type
scores
url https://usn.ubuntu.com/5861-1/
29
reference_url https://usn.ubuntu.com/5862-1/
reference_id USN-5862-1
reference_type
scores
url https://usn.ubuntu.com/5862-1/
30
reference_url https://usn.ubuntu.com/5865-1/
reference_id USN-5865-1
reference_type
scores
url https://usn.ubuntu.com/5865-1/
31
reference_url https://usn.ubuntu.com/5883-1/
reference_id USN-5883-1
reference_type
scores
url https://usn.ubuntu.com/5883-1/
32
reference_url https://usn.ubuntu.com/5924-1/
reference_id USN-5924-1
reference_type
scores
url https://usn.ubuntu.com/5924-1/
33
reference_url https://usn.ubuntu.com/5975-1/
reference_id USN-5975-1
reference_type
scores
url https://usn.ubuntu.com/5975-1/
34
reference_url https://usn.ubuntu.com/6007-1/
reference_id USN-6007-1
reference_type
scores
url https://usn.ubuntu.com/6007-1/
35
reference_url https://usn.ubuntu.com/6221-1/
reference_id USN-6221-1
reference_type
scores
url https://usn.ubuntu.com/6221-1/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-29901
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kw9v-ery2-sffr
27
url VCID-mcs2-ndqd-tydv
vulnerability_id VCID-mcs2-ndqd-tydv
summary x86: speculative vulnerability in 32bit SYSCALL path
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42331
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14119
published_at 2026-04-07T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14247
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14308
published_at 2026-04-04T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.1757
published_at 2026-04-11T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17523
published_at 2026-04-12T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17471
published_at 2026-04-13T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17413
published_at 2026-04-16T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17423
published_at 2026-04-18T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17458
published_at 2026-04-21T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17371
published_at 2026-04-24T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17497
published_at 2026-04-08T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17557
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42331
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
reference_id 1033297
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297
8
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
9
reference_url https://xenbits.xen.org/xsa/advisory-429.html
reference_id XSA-429
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-429.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42331, XSA-429
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcs2-ndqd-tydv
28
url VCID-mn7p-cz54-hqag
vulnerability_id VCID-mn7p-cz54-hqag
summary Guests can cause Xenstore crash via soft reset
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42330
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52569
published_at 2026-04-24T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.52528
published_at 2026-04-02T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52555
published_at 2026-04-04T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52521
published_at 2026-04-07T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52574
published_at 2026-04-08T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.52568
published_at 2026-04-09T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52619
published_at 2026-04-21T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.52602
published_at 2026-04-12T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52587
published_at 2026-04-13T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52626
published_at 2026-04-16T12:55:00Z
10
value 0.00292
scoring_system epss
scoring_elements 0.52633
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42330
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029830
reference_id 1029830
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029830
3
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
4
reference_url https://xenbits.xen.org/xsa/advisory-425.html
reference_id XSA-425
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-425.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42330, XSA-425
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mn7p-cz54-hqag
29
url VCID-n3xk-y5zd-hqcu
vulnerability_id VCID-n3xk-y5zd-hqcu
summary XAPI open file limit DoS
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33749
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53204
published_at 2026-04-24T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53145
published_at 2026-04-02T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53169
published_at 2026-04-04T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53137
published_at 2026-04-07T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53191
published_at 2026-04-08T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53183
published_at 2026-04-09T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53234
published_at 2026-04-11T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.5322
published_at 2026-04-12T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53203
published_at 2026-04-13T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53241
published_at 2026-04-16T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.53247
published_at 2026-04-18T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.5323
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33749
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
3
reference_url https://xenbits.xen.org/xsa/advisory-413.html
reference_id XSA-413
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-413.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-33749, XSA-413
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n3xk-y5zd-hqcu
30
url VCID-pb8n-hmsc-syfw
vulnerability_id VCID-pb8n-hmsc-syfw
summary P2M pool freeing may take excessively long
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33746
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11732
published_at 2026-04-24T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11867
published_at 2026-04-02T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11912
published_at 2026-04-04T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11698
published_at 2026-04-07T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11782
published_at 2026-04-08T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11835
published_at 2026-04-09T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11845
published_at 2026-04-11T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11806
published_at 2026-04-12T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11779
published_at 2026-04-13T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11643
published_at 2026-04-18T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11764
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33746
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
reference_id 1021668
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668
25
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
26
reference_url https://xenbits.xen.org/xsa/advisory-410.html
reference_id XSA-410
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-410.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-33746, XSA-410
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pb8n-hmsc-syfw
31
url VCID-pphm-ygb7-q7g2
vulnerability_id VCID-pphm-ygb7-q7g2
summary Xenstore: Cooperating guests can create arbitrary numbers of nodes
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42322
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09802
published_at 2026-04-09T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09727
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09776
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09681
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09752
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11254
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11455
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11393
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11255
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-24T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-419.html
reference_id XSA-419
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-419.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42322, XSA-419
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pphm-ygb7-q7g2
32
url VCID-qnew-xqte-kbej
vulnerability_id VCID-qnew-xqte-kbej
summary Xenstore: Guests can crash xenstored via exhausting the stack
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42321
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.084
published_at 2026-04-09T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08345
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08398
published_at 2026-04-04T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0832
published_at 2026-04-07T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-08T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09504
published_at 2026-04-16T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09661
published_at 2026-04-11T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09629
published_at 2026-04-12T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09613
published_at 2026-04-13T12:55:00Z
9
value 0.00033
scoring_system epss
scoring_elements 0.09509
published_at 2026-04-18T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10241
published_at 2026-04-24T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10261
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-418.html
reference_id XSA-418
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-418.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42321, XSA-418
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnew-xqte-kbej
33
url VCID-t84j-7tyr-fkfy
vulnerability_id VCID-t84j-7tyr-fkfy
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
reference_id 2090226
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2090226
3
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
4
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
5
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
6
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
7
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
8
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
9
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
10
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
11
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
12
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-23816
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t84j-7tyr-fkfy
34
url VCID-wh75-sc4f-qqc1
vulnerability_id VCID-wh75-sc4f-qqc1
summary Xenstore: Guests can create arbitrary number of nodes via transactions
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42325
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09802
published_at 2026-04-09T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09727
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09776
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09681
published_at 2026-04-07T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09752
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11254
published_at 2026-04-16T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11455
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-12T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11393
published_at 2026-04-13T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11255
published_at 2026-04-18T12:55:00Z
10
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-24T12:55:00Z
11
value 0.0004
scoring_system epss
scoring_elements 0.12097
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
25
reference_url https://xenbits.xen.org/xsa/advisory-421.html
reference_id XSA-421
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-421.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42325, XSA-421
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh75-sc4f-qqc1
35
url VCID-xcvw-eex8-j3bf
vulnerability_id VCID-xcvw-eex8-j3bf
summary PoD operations on misaligned GFNs
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28707
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24654
published_at 2026-04-24T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24807
published_at 2026-04-01T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.24885
published_at 2026-04-02T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24925
published_at 2026-04-04T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.247
published_at 2026-04-07T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24767
published_at 2026-04-08T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24813
published_at 2026-04-09T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.24827
published_at 2026-04-11T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24787
published_at 2026-04-12T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-13T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24745
published_at 2026-04-16T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24737
published_at 2026-04-18T12:55:00Z
12
value 0.00086
scoring_system epss
scoring_elements 0.24714
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28707
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-388.html
reference_id XSA-388
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-388.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28707
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xcvw-eex8-j3bf
36
url VCID-z3g4-1vhq-97dj
vulnerability_id VCID-z3g4-1vhq-97dj
summary Xenstore: Guests can create arbitrary number of nodes via transactions
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42326
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09583
published_at 2026-04-04T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09534
published_at 2026-04-02T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09618
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.0957
published_at 2026-04-08T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09496
published_at 2026-04-07T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11257
published_at 2026-04-11T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11198
published_at 2026-04-13T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11224
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11062
published_at 2026-04-16T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11071
published_at 2026-04-18T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11824
published_at 2026-04-21T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11792
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42326
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326
23
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
24
reference_url http://www.openwall.com/lists/oss-security/2022/11/01/11
reference_id 11
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url http://www.openwall.com/lists/oss-security/2022/11/01/11
25
reference_url http://xenbits.xen.org/xsa/advisory-421.html
reference_id advisory-421.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url http://xenbits.xen.org/xsa/advisory-421.html
26
reference_url https://xenbits.xenproject.org/xsa/advisory-421.txt
reference_id advisory-421.txt
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url https://xenbits.xenproject.org/xsa/advisory-421.txt
27
reference_url https://www.debian.org/security/2022/dsa-5272
reference_id dsa-5272
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url https://www.debian.org/security/2022/dsa-5272
28
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url https://security.gentoo.org/glsa/202402-07
29
reference_url https://xenbits.xen.org/xsa/advisory-421.html
reference_id XSA-421
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-421.html
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
reference_id YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
reference_id YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
reference_id ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-42326
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z3g4-1vhq-97dj
37
url VCID-z3qj-cnxq-pkgq
vulnerability_id VCID-z3qj-cnxq-pkgq
summary guests may exceed their designated memory limit
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28706
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.35982
published_at 2026-04-24T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.3616
published_at 2026-04-01T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36355
published_at 2026-04-02T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36388
published_at 2026-04-04T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36222
published_at 2026-04-07T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36271
published_at 2026-04-08T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36294
published_at 2026-04-09T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36299
published_at 2026-04-11T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.36262
published_at 2026-04-12T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.36238
published_at 2026-04-13T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.36282
published_at 2026-04-16T12:55:00Z
11
value 0.00155
scoring_system epss
scoring_elements 0.36266
published_at 2026-04-18T12:55:00Z
12
value 0.00155
scoring_system epss
scoring_elements 0.36214
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28706
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
10
reference_url https://xenbits.xen.org/xsa/advisory-385.html
reference_id XSA-385
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-385.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2021-28706, XSA-385
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z3qj-cnxq-pkgq
38
url VCID-z8zf-cqkb-guge
vulnerability_id VCID-z8zf-cqkb-guge
summary IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26360
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31257
published_at 2026-04-24T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.3149
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31523
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31481
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-13T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31479
published_at 2026-04-16T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31457
published_at 2026-04-18T12:55:00Z
11
value 0.00123
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26360
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
12
reference_url https://xenbits.xen.org/xsa/advisory-400.html
reference_id XSA-400
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-400.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-26360, XSA-400
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8zf-cqkb-guge
39
url VCID-zkyv-h5at-xkgq
vulnerability_id VCID-zkyv-h5at-xkgq
summary Retbleed - arbitrary speculative code execution with return instructions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23825
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.3369
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33723
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33561
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33605
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33638
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33633
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33591
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33569
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33602
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33578
published_at 2026-04-18T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33546
published_at 2026-04-21T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33387
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23825
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2103153
reference_id 2103153
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2103153
12
reference_url https://security.gentoo.org/glsa/202402-07
reference_id GLSA-202402-07
reference_type
scores
url https://security.gentoo.org/glsa/202402-07
13
reference_url https://access.redhat.com/errata/RHSA-2022:7110
reference_id RHSA-2022:7110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7110
14
reference_url https://access.redhat.com/errata/RHSA-2022:7134
reference_id RHSA-2022:7134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7134
15
reference_url https://access.redhat.com/errata/RHSA-2022:7337
reference_id RHSA-2022:7337
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7337
16
reference_url https://access.redhat.com/errata/RHSA-2022:7338
reference_id RHSA-2022:7338
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7338
17
reference_url https://access.redhat.com/errata/RHSA-2022:7933
reference_id RHSA-2022:7933
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7933
18
reference_url https://access.redhat.com/errata/RHSA-2022:8267
reference_id RHSA-2022:8267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8267
19
reference_url https://access.redhat.com/errata/RHSA-2022:8973
reference_id RHSA-2022:8973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8973
20
reference_url https://access.redhat.com/errata/RHSA-2022:8974
reference_id RHSA-2022:8974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8974
21
reference_url https://xenbits.xen.org/xsa/advisory-407.html
reference_id XSA-407
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-407.html
fixed_packages
0
url pkg:ebuild/app-emulation/xen@4.16.6_pre1
purl pkg:ebuild/app-emulation/xen@4.16.6_pre1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1
aliases CVE-2022-23825, XSA-407
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.16.6_pre1