Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/83007?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "type": "ebuild", "namespace": "app-emulations", "name": "xen-pvgrub", "version": "4.3.2", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.3.2-r4", "latest_non_vulnerable_version": "4.3.2-r5", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3940?format=api", "vulnerability_id": "VCID-1mnk-msa5-7bg8", "summary": "libxl partially sets up HVM passthrough even with disabled iommu", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4329.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4329.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37015", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37102", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37115", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37125", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37091", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37064", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37092", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.37035", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.36802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00162", "scoring_system": "epss", "scoring_elements": "0.3677", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006298", "reference_id": "1006298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006298" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-61.html", "reference_id": "XSA-61", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-61.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4329" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1mnk-msa5-7bg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3958?format=api", "vulnerability_id": "VCID-53ty-fwby-nuca", "summary": "Guest triggerable AMD CPU erratum may cause host hang", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6885.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6885.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6885", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72284", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.7229", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72286", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72336", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.7236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72343", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72331", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72372", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72369", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72412", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00714", "scoring_system": "epss", "scoring_elements": "0.72421", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035823", "reference_id": "1035823", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035823" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0285", "reference_id": "RHSA-2014:0285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0285" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-82.html", "reference_id": "XSA-82", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-82.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-6885" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-53ty-fwby-nuca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3951?format=api", "vulnerability_id": "VCID-6rf8-uz52-rqh6", "summary": "ocaml xenstored mishandles oversized message replies", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4416.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51214", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51292", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51251", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51306", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51303", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51347", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51312", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51352", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51361", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5134", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51287", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51294", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4416" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1017875", "reference_id": "1017875", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1017875" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-72.html", "reference_id": "XSA-72", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-72.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4416" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6rf8-uz52-rqh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3954?format=api", "vulnerability_id": "VCID-71w3-tqqz-4yf2", "summary": "Host crash due to guest VMX instruction execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4551.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62691", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62656", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62724", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62742", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62731", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62708", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62747", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62755", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62737", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62749", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00433", "scoring_system": "epss", "scoring_elements": "0.62765", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028599", "reference_id": "1028599", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028599" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-75.html", "reference_id": "XSA-75", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-75.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4551" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-71w3-tqqz-4yf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3950?format=api", "vulnerability_id": "VCID-83as-9f42-6ubf", "summary": "qemu disk backend (qdisk) resource leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4375.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25907", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25918", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25876", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25804", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25775", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25719", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25712", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012587", "reference_id": "1012587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012587" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://usn.ubuntu.com/2092-1/", "reference_id": "USN-2092-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2092-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-71.html", "reference_id": "XSA-71", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-71.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4375" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-83as-9f42-6ubf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3947?format=api", "vulnerability_id": "VCID-9trf-swg1-wfb6", "summary": "possible null dereference when parsing vif ratelimiting info", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4369.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4369.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4369", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17958", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18118", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1817", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17869", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17892", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17929", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17839", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17816", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4369" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4369" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012554", "reference_id": "1012554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012554" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-68.html", "reference_id": "XSA-68", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-68.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4369" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9trf-swg1-wfb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3952?format=api", "vulnerability_id": "VCID-ba9f-7cxr-v7f9", "summary": "Lock order reversal between page allocation and grant table locks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4494.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4494.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53711", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53766", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5375", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53787", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53792", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.5374", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00305", "scoring_system": "epss", "scoring_elements": "0.53751", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026243", "reference_id": "1026243", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1026243" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0108", "reference_id": "RHSA-2014:0108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0108" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-73.html", "reference_id": "XSA-73", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-73.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4494" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba9f-7cxr-v7f9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3960?format=api", "vulnerability_id": "VCID-bdx7-79cn-sud2", "summary": "integer overflow in several XSM/Flask hypercalls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1891.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50543", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5059", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50527", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1891" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326", "reference_id": "1062326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-84.html", "reference_id": "XSA-84", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-84.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1891" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdx7-79cn-sud2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3959?format=api", "vulnerability_id": "VCID-bksh-c5ey-37f4", "summary": "Out-of-memory condition yielding memory corruption during IRQ setup", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1642.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1642.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1642", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39247", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39438", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39401", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39314", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39117", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39099", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1642" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057140", "reference_id": "1057140", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057140" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-83.html", "reference_id": "XSA-83", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-83.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1642" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bksh-c5ey-37f4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3953?format=api", "vulnerability_id": "VCID-g39p-9sdm-tkbh", "summary": "Lock order reversal between page_alloc_lock and mm_rwlock", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4553.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55801", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55804", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55855", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55858", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55867", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55847", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55865", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55843", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55769", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55787", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029120", "reference_id": "1029120", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029120" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-74.html", "reference_id": "XSA-74", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-74.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4553" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g39p-9sdm-tkbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3966?format=api", "vulnerability_id": "VCID-g4cn-35nz-37gv", "summary": "PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1666.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1666.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1666", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87104", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87138", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87133", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87144", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87145", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.87164", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03254", "scoring_system": "epss", "scoring_elements": "0.8717", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1666" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058395", "reference_id": "1058395", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1058395" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-87.html", "reference_id": "XSA-87", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-87.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1666" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g4cn-35nz-37gv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3941?format=api", "vulnerability_id": "VCID-gnr1-nkyy-5bc5", "summary": "Information leak on AVX and/or LWP capable CPUs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1442.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1442.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29578", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.294", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29506", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29461", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29409", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29402", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29357", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2924", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29129", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006431", "reference_id": "1006431", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006431" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-62.html", "reference_id": "XSA-62", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-62.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-1442" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gnr1-nkyy-5bc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3948?format=api", "vulnerability_id": "VCID-gyum-cdqq-nbb3", "summary": "misplaced free in ocaml xc_vcpu_getaffinity stub", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4370.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24887", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24966", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.25007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24781", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24908", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24814", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24826", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24818", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24797", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24736", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24725", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012561", "reference_id": "1012561", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012561" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-69.html", "reference_id": "XSA-69", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-69.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4370" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gyum-cdqq-nbb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3968?format=api", "vulnerability_id": "VCID-j795-xm4x-gkc3", "summary": "HVMOP_set_mem_access is not preemptible", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2599.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22451", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22625", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22668", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22458", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22609", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22514", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22523", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22473", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22318", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22308", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1075499", "reference_id": "1075499", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1075499" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724", "reference_id": "757724", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-89.html", "reference_id": "XSA-89", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-89.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-2599" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j795-xm4x-gkc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3983?format=api", "vulnerability_id": "VCID-jgnb-5sdw-cuey", "summary": "Hypervisor heap contents leaked to guests", "references": [ { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0926-1.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0926-1.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-0926.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-0926.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135068.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135071.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4021.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4021.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46209", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46199", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46219", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46166", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46222", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46248", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46283", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46226", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "http://secunia.com/advisories/59208", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59208" }, { "reference_url": "http://secunia.com/advisories/60027", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60027" }, { "reference_url": "http://secunia.com/advisories/60130", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60130" }, { "reference_url": "http://secunia.com/advisories/60471", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60471" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201407-03.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201407-03.xml" }, { "reference_url": "http://support.citrix.com/article/CTX140984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.citrix.com/article/CTX140984" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3006", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3006" }, { "reference_url": "http://www.securityfocus.com/bid/68070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/68070" }, { "reference_url": "http://www.securitytracker.com/id/1030442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1030442" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-100.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-100.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103646", "reference_id": "1103646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1103646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751894", "reference_id": "751894", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751894" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4021", "reference_id": "CVE-2014-4021", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv2", "scoring_elements": "AV:A/AC:L/Au:S/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4021" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0926", "reference_id": "RHSA-2014:0926", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0926" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-100.html", "reference_id": "XSA-100", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-100.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-4021" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jgnb-5sdw-cuey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3942?format=api", "vulnerability_id": "VCID-krd6-2fmf-xbas", "summary": "Information leaks through I/O instruction emulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4355.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4355.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26375", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26427", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2647", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26244", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26312", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26362", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26371", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26326", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26267", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26273", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26248", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26213", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26138", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26135", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009598", "reference_id": "1009598", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009598" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1790", "reference_id": "RHSA-2013:1790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1790" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-63.html", "reference_id": "XSA-63", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-63.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4355" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krd6-2fmf-xbas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3955?format=api", "vulnerability_id": "VCID-mr8s-g8d8-euhb", "summary": "Hypercalls exposed to privilege rings 1 and 2 of HVM guests", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4554.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4554.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.4321", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43266", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43299", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43319", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43287", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43272", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43323", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43259", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43193", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43196", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4554" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029111", "reference_id": "1029111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1029111" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0285", "reference_id": "RHSA-2014:0285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0285" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-76.html", "reference_id": "XSA-76", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-76.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4554" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mr8s-g8d8-euhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3962?format=api", "vulnerability_id": "VCID-nwp3-9ygr-63gp", "summary": "integer overflow in several XSM/Flask hypercalls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1893.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1893.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1893", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50543", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5059", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50527", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1893" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326", "reference_id": "1062326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-84.html", "reference_id": "XSA-84", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-84.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1893" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwp3-9ygr-63gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3963?format=api", "vulnerability_id": "VCID-pqd6-dfhc-qfc3", "summary": "integer overflow in several XSM/Flask hypercalls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1894.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1894.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1894", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50543", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5059", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50527", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1894" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326", "reference_id": "1062326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-84.html", "reference_id": "XSA-84", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-84.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1894" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pqd6-dfhc-qfc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3945?format=api", "vulnerability_id": "VCID-qwuf-ccyr-guav", "summary": "Information leak through fbld instruction emulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4361.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4361.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29391", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29325", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29389", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29337", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29333", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29288", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29173", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2906", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009817", "reference_id": "1009817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009817" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-66.html", "reference_id": "XSA-66", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-66.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4361" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwuf-ccyr-guav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3971?format=api", "vulnerability_id": "VCID-r413-wp19-uuba", "summary": "HVMOP_set_mem_type allows invalid P2M entries to be created", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3124.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3124.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67055", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67152", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67158", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67174", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67155", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67188", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088243", "reference_id": "1088243", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1088243" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724", "reference_id": "757724", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-92.html", "reference_id": "XSA-92", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-92.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-3124" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r413-wp19-uuba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3965?format=api", "vulnerability_id": "VCID-sj9v-4djq-ukf1", "summary": "libvchan failure handling malicious ring indexes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1896.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1896.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34689", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34715", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34592", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34635", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34627", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34642", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34628", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34589", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34353", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34333", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1896" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1896" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062331", "reference_id": "1062331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062331" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-86.html", "reference_id": "XSA-86", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-86.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1896" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sj9v-4djq-ukf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3949?format=api", "vulnerability_id": "VCID-ssq4-ktcc-pbgp", "summary": "use-after-free in libxl_list_cpupool under memory pressure", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4371.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4371.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4371", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2416", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24323", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24111", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24177", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24196", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24139", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2414", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24117", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23991", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2398", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4371" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4371" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012582", "reference_id": "1012582", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012582" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-70.html", "reference_id": "XSA-70", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-70.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4371" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssq4-ktcc-pbgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3957?format=api", "vulnerability_id": "VCID-t9tu-mc8k-vygc", "summary": "IOMMU TLB flushing may be inadvertently suppressed", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6400.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6400.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6400", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60054", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60132", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60127", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.6019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60212", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60198", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.6018", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.6022", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60213", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60184", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00392", "scoring_system": "epss", "scoring_elements": "0.60201", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6400" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035811", "reference_id": "1035811", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1035811" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-80.html", "reference_id": "XSA-80", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-80.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-6400" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t9tu-mc8k-vygc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3956?format=api", "vulnerability_id": "VCID-tw9g-92x5-hkcz", "summary": "Insufficient TLB flushing in VT-d (iommu) code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6375.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70186", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.7018", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70226", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70264", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70249", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70287", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70267", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.7032", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00628", "scoring_system": "epss", "scoring_elements": "0.70328", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6375" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6375", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033138", "reference_id": "1033138", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1033138" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730254", "reference_id": "730254", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730254" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-78.html", "reference_id": "XSA-78", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-78.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-6375" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tw9g-92x5-hkcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3964?format=api", "vulnerability_id": "VCID-ud2r-db8a-hqhx", "summary": "Off-by-one error in FLASK_AVC_CACHESTAT hypercall", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1895.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1895.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1895", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28603", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28734", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28541", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28606", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28646", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28648", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28551", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28503", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28387", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28275", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1895" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062329", "reference_id": "1062329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062329" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-85.html", "reference_id": "XSA-85", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-85.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1895" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ud2r-db8a-hqhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3943?format=api", "vulnerability_id": "VCID-uqsf-872r-a3dc", "summary": "Memory accessible by 64-bit PV guests under live migration", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4356.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4356.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26377", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26428", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26245", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26313", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26364", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26373", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26328", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26274", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2625", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26215", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2614", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26136", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009553", "reference_id": "1009553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009553" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-64.html", "reference_id": "XSA-64", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-64.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4356" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uqsf-872r-a3dc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3961?format=api", "vulnerability_id": "VCID-ycvg-1w73-aqdj", "summary": "integer overflow in several XSM/Flask hypercalls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1892.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1892.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1892", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50491", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50543", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50547", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5059", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50527", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-1892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326", "reference_id": "1062326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1062326" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-84.html", "reference_id": "XSA-84", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-84.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2014-1892" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycvg-1w73-aqdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3946?format=api", "vulnerability_id": "VCID-zcna-d2sr-97dk", "summary": "Information leak through outs instruction emulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4368.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26361", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26413", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26456", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26231", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26354", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26309", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2623", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26195", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2612", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26116", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4329" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012550", "reference_id": "1012550", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1012550" }, { "reference_url": "https://security.gentoo.org/glsa/201407-03", "reference_id": "GLSA-201407-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201407-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1449", "reference_id": "RHSA-2013:1449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1449" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-67.html", "reference_id": "XSA-67", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-67.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83007?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83008?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83009?format=api", "purl": "pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2-r5" } ], "aliases": [ "CVE-2013-4368" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zcna-d2sr-97dk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulations/xen-pvgrub@4.3.2" }