Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulations/xen-tools@4.3.2-r4
Typeebuild
Namespaceapp-emulations
Namexen-tools
Version4.3.2-r4
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.3.2-r5
Latest_non_vulnerable_version4.3.2-r5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1mnk-msa5-7bg8
vulnerability_id VCID-1mnk-msa5-7bg8
summary libxl partially sets up HVM passthrough even with disabled iommu
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4329.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4329.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4329
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.37015
published_at 2026-04-01T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37191
published_at 2026-04-02T12:55:00Z
2
value 0.00162
scoring_system epss
scoring_elements 0.3722
published_at 2026-04-04T12:55:00Z
3
value 0.00162
scoring_system epss
scoring_elements 0.37051
published_at 2026-04-07T12:55:00Z
4
value 0.00162
scoring_system epss
scoring_elements 0.37102
published_at 2026-04-08T12:55:00Z
5
value 0.00162
scoring_system epss
scoring_elements 0.37115
published_at 2026-04-09T12:55:00Z
6
value 0.00162
scoring_system epss
scoring_elements 0.37125
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37091
published_at 2026-04-12T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37064
published_at 2026-04-13T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.3711
published_at 2026-04-16T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37092
published_at 2026-04-18T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.37035
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4329
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1006298
reference_id 1006298
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1006298
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://xenbits.xen.org/xsa/advisory-61.html
reference_id XSA-61
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-61.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4329
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mnk-msa5-7bg8
1
url VCID-53ty-fwby-nuca
vulnerability_id VCID-53ty-fwby-nuca
summary Guest triggerable AMD CPU erratum may cause host hang
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6885.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6885
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72284
published_at 2026-04-01T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.7229
published_at 2026-04-02T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72309
published_at 2026-04-04T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72286
published_at 2026-04-07T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72324
published_at 2026-04-08T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72336
published_at 2026-04-09T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.7236
published_at 2026-04-11T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72343
published_at 2026-04-12T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72331
published_at 2026-04-13T12:55:00Z
9
value 0.00714
scoring_system epss
scoring_elements 0.72372
published_at 2026-04-16T12:55:00Z
10
value 0.00714
scoring_system epss
scoring_elements 0.72382
published_at 2026-04-18T12:55:00Z
11
value 0.00714
scoring_system epss
scoring_elements 0.72369
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1035823
reference_id 1035823
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1035823
8
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
9
reference_url https://access.redhat.com/errata/RHSA-2014:0285
reference_id RHSA-2014:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0285
10
reference_url https://xenbits.xen.org/xsa/advisory-82.html
reference_id XSA-82
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-82.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-6885
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53ty-fwby-nuca
2
url VCID-6rf8-uz52-rqh6
vulnerability_id VCID-6rf8-uz52-rqh6
summary ocaml xenstored mishandles oversized message replies
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4416.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4416.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4416
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51214
published_at 2026-04-01T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51266
published_at 2026-04-02T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51292
published_at 2026-04-04T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51251
published_at 2026-04-07T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51306
published_at 2026-04-08T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51303
published_at 2026-04-09T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51347
published_at 2026-04-11T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51326
published_at 2026-04-12T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51312
published_at 2026-04-13T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51352
published_at 2026-04-16T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51361
published_at 2026-04-18T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.5134
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4416
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1017875
reference_id 1017875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1017875
3
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
4
reference_url https://xenbits.xen.org/xsa/advisory-72.html
reference_id XSA-72
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-72.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4416
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6rf8-uz52-rqh6
3
url VCID-71w3-tqqz-4yf2
vulnerability_id VCID-71w3-tqqz-4yf2
summary Host crash due to guest VMX instruction execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4551.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4551
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.62601
published_at 2026-04-01T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62659
published_at 2026-04-02T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62691
published_at 2026-04-04T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.62656
published_at 2026-04-07T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62707
published_at 2026-04-08T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62724
published_at 2026-04-09T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62742
published_at 2026-04-11T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62731
published_at 2026-04-12T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62708
published_at 2026-04-13T12:55:00Z
9
value 0.00433
scoring_system epss
scoring_elements 0.62747
published_at 2026-04-16T12:55:00Z
10
value 0.00433
scoring_system epss
scoring_elements 0.62755
published_at 2026-04-18T12:55:00Z
11
value 0.00433
scoring_system epss
scoring_elements 0.62737
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1028599
reference_id 1028599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1028599
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-75.html
reference_id XSA-75
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-75.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4551
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71w3-tqqz-4yf2
4
url VCID-83as-9f42-6ubf
vulnerability_id VCID-83as-9f42-6ubf
summary qemu disk backend (qdisk) resource leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4375.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4375
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25907
published_at 2026-04-09T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25971
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.26013
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25785
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25856
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25876
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25819
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25822
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25804
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25775
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012587
reference_id 1012587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012587
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://usn.ubuntu.com/2092-1/
reference_id USN-2092-1
reference_type
scores
url https://usn.ubuntu.com/2092-1/
6
reference_url https://xenbits.xen.org/xsa/advisory-71.html
reference_id XSA-71
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-71.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4375
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83as-9f42-6ubf
5
url VCID-9trf-swg1-wfb6
vulnerability_id VCID-9trf-swg1-wfb6
summary possible null dereference when parsing vif ratelimiting info
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4369.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4369.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4369
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17958
published_at 2026-04-01T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18118
published_at 2026-04-02T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.1817
published_at 2026-04-04T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.17869
published_at 2026-04-07T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17956
published_at 2026-04-08T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.18017
published_at 2026-04-09T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.18033
published_at 2026-04-11T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17988
published_at 2026-04-12T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17939
published_at 2026-04-13T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17882
published_at 2026-04-16T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17892
published_at 2026-04-18T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17929
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4369
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012554
reference_id 1012554
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012554
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-68.html
reference_id XSA-68
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-68.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4369
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9trf-swg1-wfb6
6
url VCID-ba9f-7cxr-v7f9
vulnerability_id VCID-ba9f-7cxr-v7f9
summary Lock order reversal between page allocation and grant table locks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4494.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4494
reference_id
reference_type
scores
0
value 0.00305
scoring_system epss
scoring_elements 0.53664
published_at 2026-04-01T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.53683
published_at 2026-04-07T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53711
published_at 2026-04-04T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53736
published_at 2026-04-08T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53734
published_at 2026-04-09T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.53782
published_at 2026-04-11T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53766
published_at 2026-04-12T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.5375
published_at 2026-04-13T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53787
published_at 2026-04-16T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53792
published_at 2026-04-18T12:55:00Z
10
value 0.00305
scoring_system epss
scoring_elements 0.53774
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4494
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1026243
reference_id 1026243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1026243
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://access.redhat.com/errata/RHSA-2014:0108
reference_id RHSA-2014:0108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0108
24
reference_url https://xenbits.xen.org/xsa/advisory-73.html
reference_id XSA-73
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-73.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4494
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ba9f-7cxr-v7f9
7
url VCID-bdx7-79cn-sud2
vulnerability_id VCID-bdx7-79cn-sud2
summary integer overflow in several XSM/Flask hypercalls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1891.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1891
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-01T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50511
published_at 2026-04-02T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50538
published_at 2026-04-04T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50491
published_at 2026-04-07T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50546
published_at 2026-04-08T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-09T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-11T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50562
published_at 2026-04-12T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50547
published_at 2026-04-13T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.5059
published_at 2026-04-16T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50594
published_at 2026-04-18T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1891
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
reference_id 1062326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
3
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
4
reference_url https://xenbits.xen.org/xsa/advisory-84.html
reference_id XSA-84
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-84.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1891
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdx7-79cn-sud2
8
url VCID-bksh-c5ey-37f4
vulnerability_id VCID-bksh-c5ey-37f4
summary Out-of-memory condition yielding memory corruption during IRQ setup
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1642.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1642
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39247
published_at 2026-04-01T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39415
published_at 2026-04-02T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39438
published_at 2026-04-04T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39353
published_at 2026-04-07T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39408
published_at 2026-04-08T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39424
published_at 2026-04-09T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39435
published_at 2026-04-11T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39396
published_at 2026-04-12T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39378
published_at 2026-04-13T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39429
published_at 2026-04-16T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39401
published_at 2026-04-18T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39314
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1057140
reference_id 1057140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1057140
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-83.html
reference_id XSA-83
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-83.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1642
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bksh-c5ey-37f4
9
url VCID-g39p-9sdm-tkbh
vulnerability_id VCID-g39p-9sdm-tkbh
summary Lock order reversal between page_alloc_lock and mm_rwlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4553.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4553
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.5569
published_at 2026-04-01T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55801
published_at 2026-04-02T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55824
published_at 2026-04-04T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55804
published_at 2026-04-07T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55855
published_at 2026-04-08T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55858
published_at 2026-04-09T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55867
published_at 2026-04-11T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55847
published_at 2026-04-12T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55829
published_at 2026-04-13T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55865
published_at 2026-04-16T12:55:00Z
10
value 0.00328
scoring_system epss
scoring_elements 0.55869
published_at 2026-04-18T12:55:00Z
11
value 0.00328
scoring_system epss
scoring_elements 0.55843
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1029120
reference_id 1029120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1029120
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://xenbits.xen.org/xsa/advisory-74.html
reference_id XSA-74
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-74.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4553
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g39p-9sdm-tkbh
10
url VCID-g4cn-35nz-37gv
vulnerability_id VCID-g4cn-35nz-37gv
summary PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1666.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1666
reference_id
reference_type
scores
0
value 0.03254
scoring_system epss
scoring_elements 0.87076
published_at 2026-04-01T12:55:00Z
1
value 0.03254
scoring_system epss
scoring_elements 0.87087
published_at 2026-04-02T12:55:00Z
2
value 0.03254
scoring_system epss
scoring_elements 0.87104
published_at 2026-04-04T12:55:00Z
3
value 0.03254
scoring_system epss
scoring_elements 0.87098
published_at 2026-04-07T12:55:00Z
4
value 0.03254
scoring_system epss
scoring_elements 0.87118
published_at 2026-04-08T12:55:00Z
5
value 0.03254
scoring_system epss
scoring_elements 0.87125
published_at 2026-04-09T12:55:00Z
6
value 0.03254
scoring_system epss
scoring_elements 0.87138
published_at 2026-04-11T12:55:00Z
7
value 0.03254
scoring_system epss
scoring_elements 0.87133
published_at 2026-04-12T12:55:00Z
8
value 0.03254
scoring_system epss
scoring_elements 0.87128
published_at 2026-04-13T12:55:00Z
9
value 0.03254
scoring_system epss
scoring_elements 0.87144
published_at 2026-04-16T12:55:00Z
10
value 0.03254
scoring_system epss
scoring_elements 0.87149
published_at 2026-04-18T12:55:00Z
11
value 0.03254
scoring_system epss
scoring_elements 0.87145
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1058395
reference_id 1058395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1058395
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-87.html
reference_id XSA-87
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-87.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1666
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4cn-35nz-37gv
11
url VCID-gnr1-nkyy-5bc5
vulnerability_id VCID-gnr1-nkyy-5bc5
summary Information leak on AVX and/or LWP capable CPUs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1442.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1442
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-08T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.2953
published_at 2026-04-02T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29578
published_at 2026-04-04T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.294
published_at 2026-04-07T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29503
published_at 2026-04-09T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29506
published_at 2026-04-11T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29461
published_at 2026-04-12T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29409
published_at 2026-04-13T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29429
published_at 2026-04-16T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29402
published_at 2026-04-18T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29357
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1442
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1006431
reference_id 1006431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1006431
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://xenbits.xen.org/xsa/advisory-62.html
reference_id XSA-62
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-62.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-1442
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gnr1-nkyy-5bc5
12
url VCID-gyum-cdqq-nbb3
vulnerability_id VCID-gyum-cdqq-nbb3
summary misplaced free in ocaml xc_vcpu_getaffinity stub
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4370.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4370
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24887
published_at 2026-04-01T12:55:00Z
1
value 0.00086
scoring_system epss
scoring_elements 0.24966
published_at 2026-04-02T12:55:00Z
2
value 0.00086
scoring_system epss
scoring_elements 0.25007
published_at 2026-04-04T12:55:00Z
3
value 0.00086
scoring_system epss
scoring_elements 0.24781
published_at 2026-04-07T12:55:00Z
4
value 0.00086
scoring_system epss
scoring_elements 0.24849
published_at 2026-04-08T12:55:00Z
5
value 0.00086
scoring_system epss
scoring_elements 0.24893
published_at 2026-04-09T12:55:00Z
6
value 0.00086
scoring_system epss
scoring_elements 0.24908
published_at 2026-04-11T12:55:00Z
7
value 0.00086
scoring_system epss
scoring_elements 0.2487
published_at 2026-04-12T12:55:00Z
8
value 0.00086
scoring_system epss
scoring_elements 0.24814
published_at 2026-04-13T12:55:00Z
9
value 0.00086
scoring_system epss
scoring_elements 0.24826
published_at 2026-04-16T12:55:00Z
10
value 0.00086
scoring_system epss
scoring_elements 0.24818
published_at 2026-04-18T12:55:00Z
11
value 0.00086
scoring_system epss
scoring_elements 0.24797
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012561
reference_id 1012561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012561
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-69.html
reference_id XSA-69
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-69.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4370
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gyum-cdqq-nbb3
13
url VCID-j795-xm4x-gkc3
vulnerability_id VCID-j795-xm4x-gkc3
summary HVMOP_set_mem_access is not preemptible
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2599.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2599
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22451
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22625
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22668
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22458
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22539
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22594
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22609
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22569
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22514
published_at 2026-04-13T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22528
published_at 2026-04-16T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22523
published_at 2026-04-18T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.22473
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1075499
reference_id 1075499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1075499
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
reference_id 757724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
23
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
24
reference_url https://xenbits.xen.org/xsa/advisory-89.html
reference_id XSA-89
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-89.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-2599
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j795-xm4x-gkc3
14
url VCID-jgnb-5sdw-cuey
vulnerability_id VCID-jgnb-5sdw-cuey
summary Hypervisor heap contents leaked to guests
references
0
reference_url http://linux.oracle.com/errata/ELSA-2014-0926-1.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0926-1.html
1
reference_url http://linux.oracle.com/errata/ELSA-2014-0926.html
reference_id
reference_type
scores
url http://linux.oracle.com/errata/ELSA-2014-0926.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135068.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135068.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135071.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135071.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4021.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4021.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4021
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46226
published_at 2026-04-21T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46158
published_at 2026-04-01T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.46199
published_at 2026-04-02T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46219
published_at 2026-04-12T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46166
published_at 2026-04-07T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46222
published_at 2026-04-08T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46224
published_at 2026-04-09T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46248
published_at 2026-04-11T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46229
published_at 2026-04-13T12:55:00Z
9
value 0.00234
scoring_system epss
scoring_elements 0.46286
published_at 2026-04-16T12:55:00Z
10
value 0.00234
scoring_system epss
scoring_elements 0.46283
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4021
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
27
reference_url http://secunia.com/advisories/59208
reference_id
reference_type
scores
url http://secunia.com/advisories/59208
28
reference_url http://secunia.com/advisories/60027
reference_id
reference_type
scores
url http://secunia.com/advisories/60027
29
reference_url http://secunia.com/advisories/60130
reference_id
reference_type
scores
url http://secunia.com/advisories/60130
30
reference_url http://secunia.com/advisories/60471
reference_id
reference_type
scores
url http://secunia.com/advisories/60471
31
reference_url http://security.gentoo.org/glsa/glsa-201407-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201407-03.xml
32
reference_url http://support.citrix.com/article/CTX140984
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX140984
33
reference_url http://www.debian.org/security/2014/dsa-3006
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3006
34
reference_url http://www.securityfocus.com/bid/68070
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68070
35
reference_url http://www.securitytracker.com/id/1030442
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1030442
36
reference_url http://xenbits.xen.org/xsa/advisory-100.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-100.html
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1103646
reference_id 1103646
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1103646
38
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751894
reference_id 751894
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751894
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4021
reference_id CVE-2014-4021
reference_type
scores
0
value 2.7
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-4021
64
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
65
reference_url https://access.redhat.com/errata/RHSA-2014:0926
reference_id RHSA-2014:0926
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0926
66
reference_url https://xenbits.xen.org/xsa/advisory-100.html
reference_id XSA-100
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-100.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-4021
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jgnb-5sdw-cuey
15
url VCID-krd6-2fmf-xbas
vulnerability_id VCID-krd6-2fmf-xbas
summary Information leaks through I/O instruction emulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4355.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4355
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26375
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26427
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.2647
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26244
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26312
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26362
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26371
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26326
published_at 2026-04-12T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26267
published_at 2026-04-13T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26273
published_at 2026-04-16T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.26248
published_at 2026-04-18T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26213
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4355
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009598
reference_id 1009598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009598
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://access.redhat.com/errata/RHSA-2013:1790
reference_id RHSA-2013:1790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1790
24
reference_url https://xenbits.xen.org/xsa/advisory-63.html
reference_id XSA-63
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-63.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4355
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krd6-2fmf-xbas
16
url VCID-mr8s-g8d8-euhb
vulnerability_id VCID-mr8s-g8d8-euhb
summary Hypercalls exposed to privilege rings 1 and 2 of HVM guests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4554.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4554.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4554
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.4321
published_at 2026-04-01T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43266
published_at 2026-04-02T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43295
published_at 2026-04-04T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43233
published_at 2026-04-07T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43284
published_at 2026-04-08T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43299
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43319
published_at 2026-04-11T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43287
published_at 2026-04-12T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43272
published_at 2026-04-13T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43334
published_at 2026-04-16T12:55:00Z
10
value 0.00209
scoring_system epss
scoring_elements 0.43323
published_at 2026-04-18T12:55:00Z
11
value 0.00209
scoring_system epss
scoring_elements 0.43259
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4554
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1029111
reference_id 1029111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1029111
3
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
4
reference_url https://access.redhat.com/errata/RHSA-2014:0285
reference_id RHSA-2014:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0285
5
reference_url https://xenbits.xen.org/xsa/advisory-76.html
reference_id XSA-76
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-76.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4554
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mr8s-g8d8-euhb
17
url VCID-nwp3-9ygr-63gp
vulnerability_id VCID-nwp3-9ygr-63gp
summary integer overflow in several XSM/Flask hypercalls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1893.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1893
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-01T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50511
published_at 2026-04-02T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50538
published_at 2026-04-04T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50491
published_at 2026-04-07T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50546
published_at 2026-04-08T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-09T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-11T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50562
published_at 2026-04-12T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50547
published_at 2026-04-13T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.5059
published_at 2026-04-16T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50594
published_at 2026-04-18T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1893
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
reference_id 1062326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
3
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
4
reference_url https://xenbits.xen.org/xsa/advisory-84.html
reference_id XSA-84
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-84.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1893
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwp3-9ygr-63gp
18
url VCID-pqd6-dfhc-qfc3
vulnerability_id VCID-pqd6-dfhc-qfc3
summary integer overflow in several XSM/Flask hypercalls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1894.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1894.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1894
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-01T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50511
published_at 2026-04-02T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50538
published_at 2026-04-04T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50491
published_at 2026-04-07T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50546
published_at 2026-04-08T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-09T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-11T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50562
published_at 2026-04-12T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50547
published_at 2026-04-13T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.5059
published_at 2026-04-16T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50594
published_at 2026-04-18T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1894
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
reference_id 1062326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
3
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
4
reference_url https://xenbits.xen.org/xsa/advisory-84.html
reference_id XSA-84
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-84.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1894
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pqd6-dfhc-qfc3
19
url VCID-qwuf-ccyr-guav
vulnerability_id VCID-qwuf-ccyr-guav
summary Information leak through fbld instruction emulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4361.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4361
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29391
published_at 2026-04-01T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29459
published_at 2026-04-02T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29507
published_at 2026-04-04T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29325
published_at 2026-04-07T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29389
published_at 2026-04-08T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.2943
published_at 2026-04-09T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29435
published_at 2026-04-11T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.2939
published_at 2026-04-12T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29337
published_at 2026-04-13T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29359
published_at 2026-04-16T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29333
published_at 2026-04-18T12:55:00Z
11
value 0.0011
scoring_system epss
scoring_elements 0.29288
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009817
reference_id 1009817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009817
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://xenbits.xen.org/xsa/advisory-66.html
reference_id XSA-66
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-66.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4361
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwuf-ccyr-guav
20
url VCID-r413-wp19-uuba
vulnerability_id VCID-r413-wp19-uuba
summary HVMOP_set_mem_type allows invalid P2M entries to be created
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3124.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3124.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3124
reference_id
reference_type
scores
0
value 0.00527
scoring_system epss
scoring_elements 0.67055
published_at 2026-04-01T12:55:00Z
1
value 0.00527
scoring_system epss
scoring_elements 0.67092
published_at 2026-04-02T12:55:00Z
2
value 0.00527
scoring_system epss
scoring_elements 0.67116
published_at 2026-04-04T12:55:00Z
3
value 0.00527
scoring_system epss
scoring_elements 0.67091
published_at 2026-04-07T12:55:00Z
4
value 0.00527
scoring_system epss
scoring_elements 0.6714
published_at 2026-04-08T12:55:00Z
5
value 0.00527
scoring_system epss
scoring_elements 0.67152
published_at 2026-04-09T12:55:00Z
6
value 0.00527
scoring_system epss
scoring_elements 0.67172
published_at 2026-04-11T12:55:00Z
7
value 0.00527
scoring_system epss
scoring_elements 0.67158
published_at 2026-04-12T12:55:00Z
8
value 0.00527
scoring_system epss
scoring_elements 0.67127
published_at 2026-04-13T12:55:00Z
9
value 0.00527
scoring_system epss
scoring_elements 0.6716
published_at 2026-04-16T12:55:00Z
10
value 0.00527
scoring_system epss
scoring_elements 0.67174
published_at 2026-04-18T12:55:00Z
11
value 0.00527
scoring_system epss
scoring_elements 0.67155
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3124
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1088243
reference_id 1088243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1088243
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
reference_id 757724
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724
23
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
24
reference_url https://xenbits.xen.org/xsa/advisory-92.html
reference_id XSA-92
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-92.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-3124
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r413-wp19-uuba
21
url VCID-sj9v-4djq-ukf1
vulnerability_id VCID-sj9v-4djq-ukf1
summary libvchan failure handling malicious ring indexes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1896.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1896.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1896
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.3447
published_at 2026-04-01T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34689
published_at 2026-04-02T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34715
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34592
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34664
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34667
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34627
published_at 2026-04-12T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34604
published_at 2026-04-13T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34642
published_at 2026-04-16T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34628
published_at 2026-04-18T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34589
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1896
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1062331
reference_id 1062331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1062331
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-86.html
reference_id XSA-86
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-86.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1896
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sj9v-4djq-ukf1
22
url VCID-ssq4-ktcc-pbgp
vulnerability_id VCID-ssq4-ktcc-pbgp
summary use-after-free in libxl_list_cpupool under memory pressure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4371.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4371.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4371
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.2416
published_at 2026-04-01T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.2429
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24323
published_at 2026-04-04T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24111
published_at 2026-04-07T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24177
published_at 2026-04-08T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24222
published_at 2026-04-09T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24238
published_at 2026-04-11T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24196
published_at 2026-04-12T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24139
published_at 2026-04-13T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.24154
published_at 2026-04-16T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.2414
published_at 2026-04-18T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.24117
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4371
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012582
reference_id 1012582
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012582
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-70.html
reference_id XSA-70
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-70.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4371
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssq4-ktcc-pbgp
23
url VCID-t9tu-mc8k-vygc
vulnerability_id VCID-t9tu-mc8k-vygc
summary IOMMU TLB flushing may be inadvertently suppressed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6400.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6400
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60054
published_at 2026-04-01T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60132
published_at 2026-04-02T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60157
published_at 2026-04-04T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60127
published_at 2026-04-07T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.60176
published_at 2026-04-08T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.6019
published_at 2026-04-09T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60212
published_at 2026-04-11T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60198
published_at 2026-04-12T12:55:00Z
8
value 0.00392
scoring_system epss
scoring_elements 0.6018
published_at 2026-04-13T12:55:00Z
9
value 0.00392
scoring_system epss
scoring_elements 0.6022
published_at 2026-04-16T12:55:00Z
10
value 0.00392
scoring_system epss
scoring_elements 0.60227
published_at 2026-04-18T12:55:00Z
11
value 0.00392
scoring_system epss
scoring_elements 0.60213
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6400
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1035811
reference_id 1035811
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1035811
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-80.html
reference_id XSA-80
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-80.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-6400
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9tu-mc8k-vygc
24
url VCID-tw9g-92x5-hkcz
vulnerability_id VCID-tw9g-92x5-hkcz
summary Insufficient TLB flushing in VT-d (iommu) code
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6375.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6375
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70174
published_at 2026-04-01T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70186
published_at 2026-04-02T12:55:00Z
2
value 0.00628
scoring_system epss
scoring_elements 0.70203
published_at 2026-04-04T12:55:00Z
3
value 0.00628
scoring_system epss
scoring_elements 0.7018
published_at 2026-04-07T12:55:00Z
4
value 0.00628
scoring_system epss
scoring_elements 0.70226
published_at 2026-04-08T12:55:00Z
5
value 0.00628
scoring_system epss
scoring_elements 0.70241
published_at 2026-04-09T12:55:00Z
6
value 0.00628
scoring_system epss
scoring_elements 0.70264
published_at 2026-04-11T12:55:00Z
7
value 0.00628
scoring_system epss
scoring_elements 0.70249
published_at 2026-04-12T12:55:00Z
8
value 0.00628
scoring_system epss
scoring_elements 0.70236
published_at 2026-04-13T12:55:00Z
9
value 0.00628
scoring_system epss
scoring_elements 0.70278
published_at 2026-04-16T12:55:00Z
10
value 0.00628
scoring_system epss
scoring_elements 0.70287
published_at 2026-04-18T12:55:00Z
11
value 0.00628
scoring_system epss
scoring_elements 0.70267
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6375
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6375
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1033138
reference_id 1033138
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1033138
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730254
reference_id 730254
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730254
5
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
6
reference_url https://xenbits.xen.org/xsa/advisory-78.html
reference_id XSA-78
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-78.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-6375
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tw9g-92x5-hkcz
25
url VCID-ud2r-db8a-hqhx
vulnerability_id VCID-ud2r-db8a-hqhx
summary Off-by-one error in FLASK_AVC_CACHESTAT hypercall
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1895.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1895
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28603
published_at 2026-04-01T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28685
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28734
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28541
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28606
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28646
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28648
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28604
published_at 2026-04-12T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28555
published_at 2026-04-13T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28576
published_at 2026-04-16T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28551
published_at 2026-04-18T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28503
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1062329
reference_id 1062329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1062329
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-85.html
reference_id XSA-85
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-85.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1895
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ud2r-db8a-hqhx
26
url VCID-uqsf-872r-a3dc
vulnerability_id VCID-uqsf-872r-a3dc
summary Memory accessible by 64-bit PV guests under live migration
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4356.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4356
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26377
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26428
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26471
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26245
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26313
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26364
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26373
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26328
published_at 2026-04-12T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.26269
published_at 2026-04-13T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26274
published_at 2026-04-16T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.2625
published_at 2026-04-18T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26215
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4356
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1009553
reference_id 1009553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1009553
4
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
5
reference_url https://xenbits.xen.org/xsa/advisory-64.html
reference_id XSA-64
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-64.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4356
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uqsf-872r-a3dc
27
url VCID-ycvg-1w73-aqdj
vulnerability_id VCID-ycvg-1w73-aqdj
summary integer overflow in several XSM/Flask hypercalls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1892.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1892.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1892
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50454
published_at 2026-04-01T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50511
published_at 2026-04-02T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50538
published_at 2026-04-04T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50491
published_at 2026-04-07T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50546
published_at 2026-04-08T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50543
published_at 2026-04-09T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-11T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50562
published_at 2026-04-12T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50547
published_at 2026-04-13T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.5059
published_at 2026-04-16T12:55:00Z
10
value 0.00271
scoring_system epss
scoring_elements 0.50594
published_at 2026-04-18T12:55:00Z
11
value 0.00271
scoring_system epss
scoring_elements 0.50573
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1892
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
reference_id 1062326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1062326
3
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
4
reference_url https://xenbits.xen.org/xsa/advisory-84.html
reference_id XSA-84
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-84.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2014-1892
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ycvg-1w73-aqdj
28
url VCID-zcna-d2sr-97dk
vulnerability_id VCID-zcna-d2sr-97dk
summary Information leak through outs instruction emulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4368.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4368
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26361
published_at 2026-04-01T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26413
published_at 2026-04-02T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26456
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26231
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26299
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26346
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26354
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26309
published_at 2026-04-12T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.2625
published_at 2026-04-13T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26255
published_at 2026-04-16T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.2623
published_at 2026-04-18T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.26195
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1012550
reference_id 1012550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1012550
22
reference_url https://security.gentoo.org/glsa/201407-03
reference_id GLSA-201407-03
reference_type
scores
url https://security.gentoo.org/glsa/201407-03
23
reference_url https://access.redhat.com/errata/RHSA-2013:1449
reference_id RHSA-2013:1449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1449
24
reference_url https://xenbits.xen.org/xsa/advisory-67.html
reference_id XSA-67
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-67.html
fixed_packages
0
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4
1
url pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
purl pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r5
aliases CVE-2013-4368
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zcna-d2sr-97dk
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-tools@4.3.2-r4