Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/app-emulation/pvgrub@4.6.0
Typeebuild
Namespaceapp-emulation
Namepvgrub
Version4.6.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.6.0-r9
Latest_non_vulnerable_version4.6.0-r9
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-12wz-93wy-euhs
vulnerability_id VCID-12wz-93wy-euhs
summary libxl leak of pv kernel and initrd on error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8341.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8341.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8341
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67622
published_at 2026-04-16T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67588
published_at 2026-04-13T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.6751
published_at 2026-04-01T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67547
published_at 2026-04-02T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67568
published_at 2026-04-04T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67546
published_at 2026-04-07T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.67598
published_at 2026-04-08T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67611
published_at 2026-04-09T12:55:00Z
8
value 0.00539
scoring_system epss
scoring_elements 0.67634
published_at 2026-04-11T12:55:00Z
9
value 0.00539
scoring_system epss
scoring_elements 0.6762
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8341
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
13
reference_url http://www.securitytracker.com/id/1034389
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034389
14
reference_url http://xenbits.xen.org/xsa/advisory-160.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-160.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1284933
reference_id 1284933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1284933
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8341
reference_id CVE-2015-8341
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8341
45
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
46
reference_url https://xenbits.xen.org/xsa/advisory-160.html
reference_id XSA-160
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-160.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8341
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-12wz-93wy-euhs
1
url VCID-1ewg-kc47-bucs
vulnerability_id VCID-1ewg-kc47-bucs
summary XENMEM_exchange error handling issues
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8340.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8340
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22096
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.2225
published_at 2026-04-02T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22296
published_at 2026-04-04T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.2208
published_at 2026-04-07T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22161
published_at 2026-04-08T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22216
published_at 2026-04-09T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22236
published_at 2026-04-11T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22196
published_at 2026-04-12T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-13T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22134
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
11
reference_url http://support.citrix.com/article/CTX203451
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX203451
12
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
13
reference_url http://www.securityfocus.com/bid/79038
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79038
14
reference_url http://www.securitytracker.com/id/1034391
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034391
15
reference_url http://xenbits.xen.org/xsa/advisory-159.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-159.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1284919
reference_id 1284919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1284919
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8340
reference_id CVE-2015-8340
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8340
63
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
64
reference_url https://xenbits.xen.org/xsa/advisory-159.html
reference_id XSA-159
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-159.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8340
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ewg-kc47-bucs
2
url VCID-21e6-1c41-1ban
vulnerability_id VCID-21e6-1c41-1ban
summary Timer overflow DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html
8
reference_url http://osvdb.org/87298
reference_id
reference_type
scores
url http://osvdb.org/87298
9
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4535.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4535.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4535
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.2864
published_at 2026-04-16T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28667
published_at 2026-04-01T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28752
published_at 2026-04-02T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28799
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28606
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28671
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28712
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28669
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28621
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4535
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535
13
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
14
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
15
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
16
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
17
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
18
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
19
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80022
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80022
21
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
22
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/1
23
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
24
reference_url http://www.securitytracker.com/id?1027759
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027759
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870086
reference_id 870086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870086
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4535
reference_id CVE-2012-4535
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4535
42
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
43
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
44
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
45
reference_url https://xenbits.xen.org/xsa/advisory-20.html
reference_id XSA-20
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-20.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-4535
risk_score 0.8
exploitability 0.5
weighted_severity 1.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-21e6-1c41-1ban
3
url VCID-285u-bk7z-sybs
vulnerability_id VCID-285u-bk7z-sybs
summary PCI MSI mask bits inadvertently exposed to guests
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4104.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4104.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4104
reference_id
reference_type
scores
0
value 0.08429
scoring_system epss
scoring_elements 0.92305
published_at 2026-04-01T12:55:00Z
1
value 0.08429
scoring_system epss
scoring_elements 0.92312
published_at 2026-04-02T12:55:00Z
2
value 0.08429
scoring_system epss
scoring_elements 0.92318
published_at 2026-04-04T12:55:00Z
3
value 0.08429
scoring_system epss
scoring_elements 0.92321
published_at 2026-04-07T12:55:00Z
4
value 0.08429
scoring_system epss
scoring_elements 0.92332
published_at 2026-04-08T12:55:00Z
5
value 0.08429
scoring_system epss
scoring_elements 0.92336
published_at 2026-04-09T12:55:00Z
6
value 0.08429
scoring_system epss
scoring_elements 0.92342
published_at 2026-04-11T12:55:00Z
7
value 0.08429
scoring_system epss
scoring_elements 0.92343
published_at 2026-04-12T12:55:00Z
8
value 0.08429
scoring_system epss
scoring_elements 0.92341
published_at 2026-04-13T12:55:00Z
9
value 0.08429
scoring_system epss
scoring_elements 0.92352
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4104
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223851
reference_id 1223851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223851
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
reference_id 787547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
12
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
13
reference_url https://usn.ubuntu.com/2630-1/
reference_id USN-2630-1
reference_type
scores
url https://usn.ubuntu.com/2630-1/
14
reference_url https://xenbits.xen.org/xsa/advisory-129.html
reference_id XSA-129
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-129.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-4104
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-285u-bk7z-sybs
4
url VCID-4s4d-gnst-1qhw
vulnerability_id VCID-4s4d-gnst-1qhw
summary multiple TMEM hypercall vulnerabilities
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
6
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3497.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3497.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3497
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28831
published_at 2026-04-16T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28855
published_at 2026-04-08T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28931
published_at 2026-04-02T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28981
published_at 2026-04-04T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28787
published_at 2026-04-07T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28896
published_at 2026-04-09T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28902
published_at 2026-04-11T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28858
published_at 2026-04-12T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3497
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497
10
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
11
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
12
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
13
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
14
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
15
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
17
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
19
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
20
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3497
reference_id CVE-2012-3497
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3497
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
28
reference_url https://xenbits.xen.org/xsa/advisory-15.html
reference_id XSA-15
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-15.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-3497
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4s4d-gnst-1qhw
5
url VCID-515s-df9v-wbab
vulnerability_id VCID-515s-df9v-wbab
summary x86: populate-on-demand balloon size inaccuracy can crash guests
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7972.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7972.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7972
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.22017
published_at 2026-04-16T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21975
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22133
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22183
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21966
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22102
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.2212
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22079
published_at 2026-04-12T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.22018
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7972
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
19
reference_url http://support.citrix.com/article/CTX202404
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX202404
20
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
21
reference_url http://www.securityfocus.com/bid/77365
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77365
22
reference_url http://www.securitytracker.com/id/1034036
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034036
23
reference_url http://xenbits.xen.org/xsa/advisory-153.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-153.html
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1276120
reference_id 1276120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1276120
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7972
reference_id CVE-2015-7972
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7972
56
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
57
reference_url https://xenbits.xen.org/xsa/advisory-153.html
reference_id XSA-153
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-153.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7972
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-515s-df9v-wbab
6
url VCID-51ck-7qgg-tfhp
vulnerability_id VCID-51ck-7qgg-tfhp
summary x86: Uncontrolled creation of large page mappings by PV guests
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7835.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7835.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7835
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26526
published_at 2026-04-16T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26625
published_at 2026-04-01T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26671
published_at 2026-04-02T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26713
published_at 2026-04-04T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26499
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26567
published_at 2026-04-08T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26616
published_at 2026-04-09T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26621
published_at 2026-04-11T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26575
published_at 2026-04-12T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26518
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7835
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835
8
reference_url https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
reference_id
reference_type
scores
url https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt
9
reference_url http://support.citrix.com/article/CTX202404
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX202404
10
reference_url http://www.debian.org/security/2015/dsa-3390
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3390
11
reference_url http://www.securityfocus.com/bid/77366
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77366
12
reference_url http://www.securitytracker.com/id/1034032
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034032
13
reference_url http://xenbits.xen.org/xsa/advisory-148.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-148.html
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271971
reference_id 1271971
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271971
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7835
reference_id CVE-2015-7835
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7835
46
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
47
reference_url https://xenbits.xen.org/xsa/advisory-148.html
reference_id XSA-148
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-148.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7835
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-51ck-7qgg-tfhp
7
url VCID-55n8-eqfw-m3gd
vulnerability_id VCID-55n8-eqfw-m3gd
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6030.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6030.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6030
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18314
published_at 2026-04-16T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18426
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18571
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18626
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18334
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18417
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18469
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18421
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.1837
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6030
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6030
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6030
reference_id CVE-2012-6030
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6030
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6030
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55n8-eqfw-m3gd
8
url VCID-5qap-uacy-myhn
vulnerability_id VCID-5qap-uacy-myhn
summary
Multiple vulnerabilities have been found in NTP, the worst of which
    could lead to Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7871.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7871
reference_id
reference_type
scores
0
value 0.7962
scoring_system epss
scoring_elements 0.99082
published_at 2026-04-01T12:55:00Z
1
value 0.7962
scoring_system epss
scoring_elements 0.99084
published_at 2026-04-02T12:55:00Z
2
value 0.7962
scoring_system epss
scoring_elements 0.99086
published_at 2026-04-04T12:55:00Z
3
value 0.7962
scoring_system epss
scoring_elements 0.99089
published_at 2026-04-07T12:55:00Z
4
value 0.7962
scoring_system epss
scoring_elements 0.9909
published_at 2026-04-09T12:55:00Z
5
value 0.7962
scoring_system epss
scoring_elements 0.99091
published_at 2026-04-11T12:55:00Z
6
value 0.7962
scoring_system epss
scoring_elements 0.99092
published_at 2026-04-13T12:55:00Z
7
value 0.7962
scoring_system epss
scoring_elements 0.99093
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1274265
reference_id 1274265
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1274265
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
20
reference_url https://security.gentoo.org/glsa/201607-15
reference_id GLSA-201607-15
reference_type
scores
url https://security.gentoo.org/glsa/201607-15
21
reference_url https://usn.ubuntu.com/2783-1/
reference_id USN-2783-1
reference_type
scores
url https://usn.ubuntu.com/2783-1/
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7871
risk_score 1.4
exploitability 2.0
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qap-uacy-myhn
9
url VCID-83pg-u792-vkht
vulnerability_id VCID-83pg-u792-vkht
summary XENMEM_exchange error handling issues
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8339.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8339.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8339
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26789
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26832
published_at 2026-04-02T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26872
published_at 2026-04-04T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26658
published_at 2026-04-07T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26726
published_at 2026-04-08T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26776
published_at 2026-04-09T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.2678
published_at 2026-04-11T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26735
published_at 2026-04-12T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26679
published_at 2026-04-13T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26687
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8339
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
11
reference_url http://support.citrix.com/article/CTX203451
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX203451
12
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
13
reference_url http://www.securityfocus.com/bid/79038
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79038
14
reference_url http://www.securitytracker.com/id/1034391
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034391
15
reference_url http://xenbits.xen.org/xsa/advisory-159.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-159.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1284919
reference_id 1284919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1284919
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8339
reference_id CVE-2015-8339
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-8339
63
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
64
reference_url https://xenbits.xen.org/xsa/advisory-159.html
reference_id XSA-159
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-159.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8339
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83pg-u792-vkht
10
url VCID-8q9q-fs5n-gyfj
vulnerability_id VCID-8q9q-fs5n-gyfj
summary Privilege escalation via emulated floppy disk drive
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
reference_id
reference_type
scores
0
value 0.32263
scoring_system epss
scoring_elements 0.96809
published_at 2026-04-01T12:55:00Z
1
value 0.32263
scoring_system epss
scoring_elements 0.96816
published_at 2026-04-02T12:55:00Z
2
value 0.32263
scoring_system epss
scoring_elements 0.96841
published_at 2026-04-16T12:55:00Z
3
value 0.36084
scoring_system epss
scoring_elements 0.97088
published_at 2026-04-08T12:55:00Z
4
value 0.36084
scoring_system epss
scoring_elements 0.97089
published_at 2026-04-09T12:55:00Z
5
value 0.36084
scoring_system epss
scoring_elements 0.97092
published_at 2026-04-11T12:55:00Z
6
value 0.36084
scoring_system epss
scoring_elements 0.97093
published_at 2026-04-12T12:55:00Z
7
value 0.36084
scoring_system epss
scoring_elements 0.97094
published_at 2026-04-13T12:55:00Z
8
value 0.36084
scoring_system epss
scoring_elements 0.97079
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
reference_id 1218611
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1218611
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
reference_id 785424
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c
9
reference_url https://marc.info/?l=oss-security&m=143155206320935&w=2
reference_id CVE-2015-3456;OSVDB-122072
reference_type exploit
scores
url https://marc.info/?l=oss-security&m=143155206320935&w=2
10
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://security.gentoo.org/glsa/201612-27
reference_id GLSA-201612-27
reference_type
scores
url https://security.gentoo.org/glsa/201612-27
13
reference_url https://access.redhat.com/errata/RHSA-2015:0998
reference_id RHSA-2015:0998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0998
14
reference_url https://access.redhat.com/errata/RHSA-2015:0999
reference_id RHSA-2015:0999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0999
15
reference_url https://access.redhat.com/errata/RHSA-2015:1000
reference_id RHSA-2015:1000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1000
16
reference_url https://access.redhat.com/errata/RHSA-2015:1001
reference_id RHSA-2015:1001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1001
17
reference_url https://access.redhat.com/errata/RHSA-2015:1002
reference_id RHSA-2015:1002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1002
18
reference_url https://access.redhat.com/errata/RHSA-2015:1003
reference_id RHSA-2015:1003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1003
19
reference_url https://access.redhat.com/errata/RHSA-2015:1004
reference_id RHSA-2015:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1004
20
reference_url https://access.redhat.com/errata/RHSA-2015:1011
reference_id RHSA-2015:1011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1011
21
reference_url https://access.redhat.com/errata/RHSA-2015:1031
reference_id RHSA-2015:1031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1031
22
reference_url https://usn.ubuntu.com/2608-1/
reference_id USN-2608-1
reference_type
scores
url https://usn.ubuntu.com/2608-1/
23
reference_url https://xenbits.xen.org/xsa/advisory-133.html
reference_id XSA-133
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-133.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-3456
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj
11
url VCID-9df6-w2mk-37bp
vulnerability_id VCID-9df6-w2mk-37bp
summary arm: Host crash when preempting a multicall
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7812.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7812.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7812
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2273
published_at 2026-04-16T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22651
published_at 2026-04-01T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22825
published_at 2026-04-02T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22869
published_at 2026-04-04T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.2266
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22735
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22786
published_at 2026-04-09T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-11T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.2277
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22714
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7812
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
18
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
19
reference_url http://www.securitytracker.com/id/1034031
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034031
20
reference_url http://xenbits.xen.org/xsa/advisory-145.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-145.html
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271621
reference_id 1271621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271621
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7812
reference_id CVE-2015-7812
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7812
31
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
32
reference_url https://xenbits.xen.org/xsa/advisory-145.html
reference_id XSA-145
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-145.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7812
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9df6-w2mk-37bp
12
url VCID-9hbw-uh8q-1uex
vulnerability_id VCID-9hbw-uh8q-1uex
summary hypercall set_debugreg vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
9
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00000.html
10
reference_url http://osvdb.org/85197
reference_id
reference_type
scores
url http://osvdb.org/85197
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3494.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3494.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3494
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29605
published_at 2026-04-16T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29642
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29709
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.2976
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29579
published_at 2026-04-07T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29641
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29679
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29681
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29637
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29586
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3494
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494
14
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
15
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
16
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
17
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
18
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78265
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78265
20
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
21
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-12_hypercall_set_debugreg_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-12_hypercall_set_debugreg_vulnerability
22
reference_url http://www.debian.org/security/2012/dsa-2544
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2544
23
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/5
24
reference_url http://www.securityfocus.com/bid/55400
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55400
25
reference_url http://www.securitytracker.com/id?1027479
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027479
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851139
reference_id 851139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851139
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*
reference_id cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x64:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*
reference_id cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:-:*:*:*:*:x86:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x64:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:-:*:*:*:*:x86:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x64:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:-:*:*:*:*:x86:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*
reference_id cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x64:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
reference_id cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:-:*:*:*:*:x86:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3494
reference_id CVE-2012-3494
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3494
37
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
38
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
39
reference_url https://xenbits.xen.org/xsa/advisory-12.html
reference_id XSA-12
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-12.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-3494
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9hbw-uh8q-1uex
13
url VCID-9jjd-pybt-aqcm
vulnerability_id VCID-9jjd-pybt-aqcm
summary Hypervisor memory corruption due to x86 emulator flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2151
reference_id
reference_type
scores
0
value 0.00235
scoring_system epss
scoring_elements 0.46404
published_at 2026-04-01T12:55:00Z
1
value 0.00235
scoring_system epss
scoring_elements 0.46444
published_at 2026-04-02T12:55:00Z
2
value 0.00235
scoring_system epss
scoring_elements 0.46463
published_at 2026-04-12T12:55:00Z
3
value 0.00235
scoring_system epss
scoring_elements 0.46413
published_at 2026-04-07T12:55:00Z
4
value 0.00235
scoring_system epss
scoring_elements 0.46468
published_at 2026-04-08T12:55:00Z
5
value 0.00235
scoring_system epss
scoring_elements 0.46469
published_at 2026-04-09T12:55:00Z
6
value 0.00235
scoring_system epss
scoring_elements 0.46492
published_at 2026-04-11T12:55:00Z
7
value 0.00235
scoring_system epss
scoring_elements 0.46473
published_at 2026-04-13T12:55:00Z
8
value 0.00235
scoring_system epss
scoring_elements 0.4653
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1196274
reference_id 1196274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1196274
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780227
reference_id 780227
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780227
7
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
8
reference_url https://access.redhat.com/errata/RHSA-2016:0450
reference_id RHSA-2016:0450
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0450
9
reference_url https://xenbits.xen.org/xsa/advisory-123.html
reference_id XSA-123
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-123.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-2151
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jjd-pybt-aqcm
14
url VCID-9u79-6d2w-aqcr
vulnerability_id VCID-9u79-6d2w-aqcr
summary Information leak through XEN_DOMCTL_gettscinfo
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3340.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3340.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3340
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70313
published_at 2026-04-01T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70325
published_at 2026-04-02T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70342
published_at 2026-04-04T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.7032
published_at 2026-04-07T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70365
published_at 2026-04-08T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.7038
published_at 2026-04-09T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70404
published_at 2026-04-11T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.70389
published_at 2026-04-12T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70374
published_at 2026-04-13T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70417
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3340
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1214035
reference_id 1214035
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1214035
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784011
reference_id 784011
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784011
17
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
18
reference_url https://xenbits.xen.org/xsa/advisory-132.html
reference_id XSA-132
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-132.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-3340
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9u79-6d2w-aqcr
15
url VCID-9yb3-ge9b-sbe1
vulnerability_id VCID-9yb3-ge9b-sbe1
summary VMX: guest user mode may crash guest with non-canonical RIP
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2271.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2271.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2271
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20466
published_at 2026-04-16T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20475
published_at 2026-04-13T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.2048
published_at 2026-04-01T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20625
published_at 2026-04-02T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20684
published_at 2026-04-04T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20412
published_at 2026-04-07T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20494
published_at 2026-04-08T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20553
published_at 2026-04-09T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20575
published_at 2026-04-11T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20531
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2271
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
13
reference_url http://support.citrix.com/article/CTX209443
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX209443
14
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
15
reference_url http://www.securitytracker.com/id/1035043
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035043
16
reference_url http://xenbits.xen.org/xsa/advisory-170.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-170.html
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1304628
reference_id 1304628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1304628
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2271
reference_id CVE-2016-2271
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2271
22
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
23
reference_url https://xenbits.xen.org/xsa/advisory-170.html
reference_id XSA-170
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-170.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2016-2271
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yb3-ge9b-sbe1
16
url VCID-a7w3-bhxr-rqhe
vulnerability_id VCID-a7w3-bhxr-rqhe
summary qemu-dm buffer overrun in MSI-X handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8554.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8554.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8554
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19002
published_at 2026-04-16T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19046
published_at 2026-04-13T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19103
published_at 2026-04-01T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19238
published_at 2026-04-02T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19289
published_at 2026-04-04T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19005
published_at 2026-04-07T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19085
published_at 2026-04-08T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19138
published_at 2026-04-09T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19145
published_at 2026-04-11T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19099
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8554
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554
3
reference_url http://support.citrix.com/article/CTX203879
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX203879
4
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
5
reference_url http://www.securityfocus.com/bid/79579
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79579
6
reference_url http://www.securitytracker.com/id/1034481
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034481
7
reference_url http://xenbits.xen.org/xsa/advisory-164.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-164.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289129
reference_id 1289129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289129
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8554
reference_id CVE-2015-8554
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8554
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://xenbits.xen.org/xsa/advisory-164.html
reference_id XSA-164
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-164.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8554
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a7w3-bhxr-rqhe
17
url VCID-au4w-wt7d-37h4
vulnerability_id VCID-au4w-wt7d-37h4
summary information leak in legacy x86 FPU/XMM initialization
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8555.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8555.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8555
reference_id
reference_type
scores
0
value 0.00551
scoring_system epss
scoring_elements 0.68029
published_at 2026-04-16T12:55:00Z
1
value 0.00551
scoring_system epss
scoring_elements 0.67992
published_at 2026-04-13T12:55:00Z
2
value 0.00551
scoring_system epss
scoring_elements 0.67932
published_at 2026-04-01T12:55:00Z
3
value 0.00551
scoring_system epss
scoring_elements 0.67954
published_at 2026-04-02T12:55:00Z
4
value 0.00551
scoring_system epss
scoring_elements 0.67973
published_at 2026-04-04T12:55:00Z
5
value 0.00551
scoring_system epss
scoring_elements 0.67952
published_at 2026-04-07T12:55:00Z
6
value 0.00551
scoring_system epss
scoring_elements 0.68003
published_at 2026-04-08T12:55:00Z
7
value 0.00551
scoring_system epss
scoring_elements 0.68017
published_at 2026-04-09T12:55:00Z
8
value 0.00551
scoring_system epss
scoring_elements 0.6804
published_at 2026-04-11T12:55:00Z
9
value 0.00551
scoring_system epss
scoring_elements 0.68026
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8555
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
11
reference_url http://support.citrix.com/article/CTX203879
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX203879
12
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
13
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
14
reference_url http://www.securityfocus.com/bid/79543
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79543
15
reference_url http://www.securitytracker.com/id/1034477
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034477
16
reference_url http://xenbits.xen.org/xsa/advisory-165.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-165.html
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289130
reference_id 1289130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289130
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8555
reference_id CVE-2015-8555
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-8555
37
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
38
reference_url https://xenbits.xen.org/xsa/advisory-165.html
reference_id XSA-165
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-165.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8555
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-au4w-wt7d-37h4
18
url VCID-awup-6h5b-uydc
vulnerability_id VCID-awup-6h5b-uydc
summary Potential unintended writes to host MSI message data field via qemu
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4103.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4103.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4103
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31201
published_at 2026-04-01T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31328
published_at 2026-04-02T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.3137
published_at 2026-04-04T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.3119
published_at 2026-04-07T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31243
published_at 2026-04-08T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31273
published_at 2026-04-09T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31278
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31234
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31191
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31224
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4103
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223846
reference_id 1223846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223846
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
reference_id 787547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
12
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
13
reference_url https://usn.ubuntu.com/2630-1/
reference_id USN-2630-1
reference_type
scores
url https://usn.ubuntu.com/2630-1/
14
reference_url https://xenbits.xen.org/xsa/advisory-128.html
reference_id XSA-128
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-128.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-4103
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awup-6h5b-uydc
19
url VCID-bhws-bgg4-m3bn
vulnerability_id VCID-bhws-bgg4-m3bn
summary PHYSDEVOP_map_pirq index vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00005.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00005.html
6
reference_url http://osvdb.org/85198
reference_id
reference_type
scores
url http://osvdb.org/85198
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3498.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3498.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3498
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20829
published_at 2026-04-16T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20855
published_at 2026-04-01T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21006
published_at 2026-04-02T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21062
published_at 2026-04-04T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20777
published_at 2026-04-07T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20857
published_at 2026-04-08T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-09T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20935
published_at 2026-04-11T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20891
published_at 2026-04-12T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20839
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498
10
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
11
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
12
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
13
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
14
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
15
reference_url http://securitytracker.com/id?1027483
reference_id
reference_type
scores
url http://securitytracker.com/id?1027483
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78269
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78269
17
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
18
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-16_PHYSDEVOP_map_pirq_index_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-16_PHYSDEVOP_map_pirq_index_vulnerability
19
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/9
20
reference_url http://www.securityfocus.com/bid/55414
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55414
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851193
reference_id 851193
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851193
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3498
reference_id CVE-2012-3498
reference_type
scores
0
value 5.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3498
27
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
28
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
29
reference_url https://xenbits.xen.org/xsa/advisory-16.html
reference_id XSA-16
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-16.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-3498
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhws-bgg4-m3bn
20
url VCID-bz27-8gdr-xue7
vulnerability_id VCID-bz27-8gdr-xue7
summary Qemu VT100 emulation vulnerability
references
0
reference_url http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
reference_id
reference_type
scores
url http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00016.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00024.html
10
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00026.html
11
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00027.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00002.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-09/msg00051.html
16
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00003.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2012-1233.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1233.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2012-1234.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1234.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2012-1235.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1235.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2012-1236.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1236.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2012-1262.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1262.html
22
reference_url http://rhn.redhat.com/errata/RHSA-2012-1325.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1325.html
23
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3515.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3515.json
24
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3515
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31334
published_at 2026-04-16T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31294
published_at 2026-04-07T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31434
published_at 2026-04-02T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31476
published_at 2026-04-04T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31347
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31378
published_at 2026-04-09T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31382
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31338
published_at 2026-04-12T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.313
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3515
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515
26
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
27
reference_url http://secunia.com/advisories/50528
reference_id
reference_type
scores
url http://secunia.com/advisories/50528
28
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
29
reference_url http://secunia.com/advisories/50632
reference_id
reference_type
scores
url http://secunia.com/advisories/50632
30
reference_url http://secunia.com/advisories/50689
reference_id
reference_type
scores
url http://secunia.com/advisories/50689
31
reference_url http://secunia.com/advisories/50860
reference_id
reference_type
scores
url http://secunia.com/advisories/50860
32
reference_url http://secunia.com/advisories/50913
reference_id
reference_type
scores
url http://secunia.com/advisories/50913
33
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
34
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
35
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
36
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
37
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-17_Qemu_VT100_emulation_vulnerability
38
reference_url http://www.debian.org/security/2012/dsa-2543
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2543
39
reference_url http://www.debian.org/security/2012/dsa-2545
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2545
40
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/10
41
reference_url http://www.securityfocus.com/bid/55413
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55413
42
reference_url http://www.ubuntu.com/usn/USN-1590-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1590-1
43
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851252
reference_id 851252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851252
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3515
reference_id CVE-2012-3515
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3515
79
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
80
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
81
reference_url https://access.redhat.com/errata/RHSA-2012:1233
reference_id RHSA-2012:1233
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1233
82
reference_url https://access.redhat.com/errata/RHSA-2012:1234
reference_id RHSA-2012:1234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1234
83
reference_url https://access.redhat.com/errata/RHSA-2012:1235
reference_id RHSA-2012:1235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1235
84
reference_url https://access.redhat.com/errata/RHSA-2012:1236
reference_id RHSA-2012:1236
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1236
85
reference_url https://access.redhat.com/errata/RHSA-2012:1325
reference_id RHSA-2012:1325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1325
86
reference_url https://usn.ubuntu.com/1590-1/
reference_id USN-1590-1
reference_type
scores
url https://usn.ubuntu.com/1590-1/
87
reference_url https://xenbits.xen.org/xsa/advisory-17.html
reference_id XSA-17
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-17.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-3515
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz27-8gdr-xue7
21
url VCID-cp4s-pytr-zbf1
vulnerability_id VCID-cp4s-pytr-zbf1
summary Linux pciback missing sanity checks leading to crash
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8551.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8551.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8551
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22086
published_at 2026-04-16T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22186
published_at 2026-04-11T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22145
published_at 2026-04-12T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22042
published_at 2026-04-01T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.222
published_at 2026-04-02T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22248
published_at 2026-04-04T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.2203
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22111
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22166
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8551
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.2
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:S/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url http://www.debian.org/security/2016/dsa-3434
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3434
18
reference_url http://www.securityfocus.com/bid/79546
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79546
19
reference_url http://www.securitytracker.com/id/1034480
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034480
20
reference_url http://xenbits.xen.org/xsa/advisory-157.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-157.html
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289128
reference_id 1289128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289128
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp1:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8551
reference_id CVE-2015-8551
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
1
value 6.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8551
37
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
38
reference_url https://usn.ubuntu.com/2846-1/
reference_id USN-2846-1
reference_type
scores
url https://usn.ubuntu.com/2846-1/
39
reference_url https://usn.ubuntu.com/2847-1/
reference_id USN-2847-1
reference_type
scores
url https://usn.ubuntu.com/2847-1/
40
reference_url https://usn.ubuntu.com/2848-1/
reference_id USN-2848-1
reference_type
scores
url https://usn.ubuntu.com/2848-1/
41
reference_url https://usn.ubuntu.com/2849-1/
reference_id USN-2849-1
reference_type
scores
url https://usn.ubuntu.com/2849-1/
42
reference_url https://usn.ubuntu.com/2850-1/
reference_id USN-2850-1
reference_type
scores
url https://usn.ubuntu.com/2850-1/
43
reference_url https://usn.ubuntu.com/2851-1/
reference_id USN-2851-1
reference_type
scores
url https://usn.ubuntu.com/2851-1/
44
reference_url https://usn.ubuntu.com/2853-1/
reference_id USN-2853-1
reference_type
scores
url https://usn.ubuntu.com/2853-1/
45
reference_url https://usn.ubuntu.com/2854-1/
reference_id USN-2854-1
reference_type
scores
url https://usn.ubuntu.com/2854-1/
46
reference_url https://xenbits.xen.org/xsa/advisory-157.html
reference_id XSA-157
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-157.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8551
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cp4s-pytr-zbf1
22
url VCID-ctrg-1peq-vfdx
vulnerability_id VCID-ctrg-1peq-vfdx
summary xl command line config handling stack overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3259.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3259.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3259
reference_id
reference_type
scores
0
value 0.00056
scoring_system epss
scoring_elements 0.17541
published_at 2026-04-16T12:55:00Z
1
value 0.00056
scoring_system epss
scoring_elements 0.17586
published_at 2026-04-01T12:55:00Z
2
value 0.00056
scoring_system epss
scoring_elements 0.17748
published_at 2026-04-02T12:55:00Z
3
value 0.00056
scoring_system epss
scoring_elements 0.17796
published_at 2026-04-04T12:55:00Z
4
value 0.00056
scoring_system epss
scoring_elements 0.17524
published_at 2026-04-07T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17613
published_at 2026-04-08T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17674
published_at 2026-04-09T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17692
published_at 2026-04-11T12:55:00Z
8
value 0.00056
scoring_system epss
scoring_elements 0.17646
published_at 2026-04-12T12:55:00Z
9
value 0.00056
scoring_system epss
scoring_elements 0.17595
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3259
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1238088
reference_id 1238088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1238088
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795721
reference_id 795721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795721
18
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
19
reference_url https://xenbits.xen.org/xsa/advisory-137.html
reference_id XSA-137
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-137.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-3259
risk_score 1.0
exploitability 0.5
weighted_severity 2.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ctrg-1peq-vfdx
23
url VCID-dhgj-d3h1-cue7
vulnerability_id VCID-dhgj-d3h1-cue7
summary heap buffer overflow vulnerability in pcnet emulator
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2015-2694.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2694.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-2695.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2695.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2015-2696.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2696.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7504.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7504
reference_id
reference_type
scores
0
value 0.00783
scoring_system epss
scoring_elements 0.73781
published_at 2026-04-16T12:55:00Z
1
value 0.00783
scoring_system epss
scoring_elements 0.73739
published_at 2026-04-13T12:55:00Z
2
value 0.00783
scoring_system epss
scoring_elements 0.73691
published_at 2026-04-01T12:55:00Z
3
value 0.00783
scoring_system epss
scoring_elements 0.73701
published_at 2026-04-02T12:55:00Z
4
value 0.00783
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-04T12:55:00Z
5
value 0.00783
scoring_system epss
scoring_elements 0.73696
published_at 2026-04-07T12:55:00Z
6
value 0.00783
scoring_system epss
scoring_elements 0.73731
published_at 2026-04-08T12:55:00Z
7
value 0.00783
scoring_system epss
scoring_elements 0.73744
published_at 2026-04-09T12:55:00Z
8
value 0.00783
scoring_system epss
scoring_elements 0.73766
published_at 2026-04-11T12:55:00Z
9
value 0.00783
scoring_system epss
scoring_elements 0.73748
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7504
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
24
reference_url https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
reference_id
reference_type
scores
url https://lists.gnu.org/archive/html/qemu-devel/2015-11/msg06342.html
25
reference_url http://www.debian.org/security/2016/dsa-3469
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3469
26
reference_url http://www.debian.org/security/2016/dsa-3470
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3470
27
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
28
reference_url http://www.openwall.com/lists/oss-security/2015/11/30/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/30/2
29
reference_url http://www.securityfocus.com/bid/78227
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78227
30
reference_url http://www.securitytracker.com/id/1034268
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034268
31
reference_url http://xenbits.xen.org/xsa/advisory-162.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-162.html
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261461
reference_id 1261461
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261461
33
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742
reference_id 806742
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806742
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc0:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc1:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:qemu:qemu:2.5.0:rc2:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7504
reference_id CVE-2015-7504
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7504
42
reference_url https://security.gentoo.org/glsa/201602-01
reference_id GLSA-201602-01
reference_type
scores
url https://security.gentoo.org/glsa/201602-01
43
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
44
reference_url https://access.redhat.com/errata/RHSA-2015:2694
reference_id RHSA-2015:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2694
45
reference_url https://access.redhat.com/errata/RHSA-2015:2695
reference_id RHSA-2015:2695
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2695
46
reference_url https://access.redhat.com/errata/RHSA-2015:2696
reference_id RHSA-2015:2696
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2696
47
reference_url https://usn.ubuntu.com/2828-1/
reference_id USN-2828-1
reference_type
scores
url https://usn.ubuntu.com/2828-1/
48
reference_url https://xenbits.xen.org/xsa/advisory-162.html
reference_id XSA-162
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-162.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7504
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhgj-d3h1-cue7
24
url VCID-dzsn-fpfg-vbhy
vulnerability_id VCID-dzsn-fpfg-vbhy
summary leak of main per-domain vcpu pointer array
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7969.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7969.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7969
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17345
published_at 2026-04-16T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17343
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17511
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17558
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17338
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.1743
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17491
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17503
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17456
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17403
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7969
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
19
reference_url http://support.citrix.com/article/CTX202404
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX202404
20
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
21
reference_url http://www.securityfocus.com/bid/77364
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77364
22
reference_url http://www.securitytracker.com/id/1034033
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034033
23
reference_url http://xenbits.xen.org/xsa/advisory-149.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-149.html
24
reference_url http://xenbits.xen.org/xsa/advisory-151.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-151.html
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1272519
reference_id 1272519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1272519
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7969
reference_id CVE-2015-7969
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7969
52
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
53
reference_url https://xenbits.xen.org/xsa/advisory-149.html
reference_id XSA-149
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-149.html
54
reference_url https://xenbits.xen.org/xsa/advisory-151.html
reference_id XSA-151
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-151.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7969
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzsn-fpfg-vbhy
25
url VCID-eg78-hrzm-vucz
vulnerability_id VCID-eg78-hrzm-vucz
summary arm: Race between domain destruction and memory allocation decrease
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7814.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7814.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7814
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17258
published_at 2026-04-16T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17264
published_at 2026-04-01T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17432
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17478
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17257
published_at 2026-04-07T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17348
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17408
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.1742
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17372
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17317
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7814
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
18
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
19
reference_url http://www.securitytracker.com/id/1034030
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034030
20
reference_url http://xenbits.xen.org/xsa/advisory-147.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-147.html
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271630
reference_id 1271630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271630
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7814
reference_id CVE-2015-7814
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7814
24
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
25
reference_url https://xenbits.xen.org/xsa/advisory-147.html
reference_id XSA-147
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-147.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7814
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eg78-hrzm-vucz
26
url VCID-egfe-8d7p-mfaf
vulnerability_id VCID-egfe-8d7p-mfaf
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6036.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6036.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6036
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32402
published_at 2026-04-16T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.32343
published_at 2026-04-01T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.32494
published_at 2026-04-02T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.32529
published_at 2026-04-04T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32351
published_at 2026-04-07T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.324
published_at 2026-04-08T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32428
published_at 2026-04-09T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32431
published_at 2026-04-11T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32393
published_at 2026-04-12T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32365
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6036
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6036
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80326
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80326
10
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
11
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
12
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
13
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6036
reference_id CVE-2012-6036
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6036
19
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
20
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6036
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-egfe-8d7p-mfaf
27
url VCID-fat6-7z31-cucj
vulnerability_id VCID-fat6-7z31-cucj
summary Linux pciback missing sanity checks leading to crash
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8552.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8552.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8552
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.3722
published_at 2026-04-16T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37174
published_at 2026-04-13T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37137
published_at 2026-04-01T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37304
published_at 2026-04-02T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.3733
published_at 2026-04-04T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37158
published_at 2026-04-07T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37209
published_at 2026-04-08T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37224
published_at 2026-04-09T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37234
published_at 2026-04-11T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.372
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8552
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
16
reference_url http://www.debian.org/security/2016/dsa-3434
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3434
17
reference_url http://www.securityfocus.com/bid/79546
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79546
18
reference_url http://www.securitytracker.com/id/1034480
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034480
19
reference_url http://xenbits.xen.org/xsa/advisory-157.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-157.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289128
reference_id 1289128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289128
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:11:sp4:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8552
reference_id CVE-2015-8552
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8552
65
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
66
reference_url https://usn.ubuntu.com/2846-1/
reference_id USN-2846-1
reference_type
scores
url https://usn.ubuntu.com/2846-1/
67
reference_url https://usn.ubuntu.com/2847-1/
reference_id USN-2847-1
reference_type
scores
url https://usn.ubuntu.com/2847-1/
68
reference_url https://usn.ubuntu.com/2848-1/
reference_id USN-2848-1
reference_type
scores
url https://usn.ubuntu.com/2848-1/
69
reference_url https://usn.ubuntu.com/2849-1/
reference_id USN-2849-1
reference_type
scores
url https://usn.ubuntu.com/2849-1/
70
reference_url https://usn.ubuntu.com/2850-1/
reference_id USN-2850-1
reference_type
scores
url https://usn.ubuntu.com/2850-1/
71
reference_url https://usn.ubuntu.com/2851-1/
reference_id USN-2851-1
reference_type
scores
url https://usn.ubuntu.com/2851-1/
72
reference_url https://usn.ubuntu.com/2853-1/
reference_id USN-2853-1
reference_type
scores
url https://usn.ubuntu.com/2853-1/
73
reference_url https://usn.ubuntu.com/2854-1/
reference_id USN-2854-1
reference_type
scores
url https://usn.ubuntu.com/2854-1/
74
reference_url https://xenbits.xen.org/xsa/advisory-157.html
reference_id XSA-157
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-157.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8552
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fat6-7z31-cucj
28
url VCID-fkzr-8wde-fkbk
vulnerability_id VCID-fkzr-8wde-fkbk
summary guest administrator can access qemu monitor console
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00007.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00007.html
6
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00008.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00008.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4411.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4411.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4411
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21945
published_at 2026-04-16T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21905
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22067
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22118
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21893
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21975
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.2203
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4411
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411
10
reference_url http://secunia.com/advisories/50493
reference_id
reference_type
scores
url http://secunia.com/advisories/50493
11
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
12
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
13
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
14
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
15
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
16
reference_url http://www.debian.org/security/2012/dsa-2543
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2543
17
reference_url http://www.openwall.com/lists/oss-security/2012/09/06/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/06/2
18
reference_url http://www.openwall.com/lists/oss-security/2012/09/06/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/06/7
19
reference_url http://www.openwall.com/lists/oss-security/2012/09/07/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/07/5
20
reference_url http://www.securityfocus.com/bid/55442
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55442
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=855140
reference_id 855140
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=855140
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4411
reference_id CVE-2012-4411
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:C/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-4411
26
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
27
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
28
reference_url https://xenbits.xen.org/xsa/advisory-19.html
reference_id XSA-19
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-19.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-4411
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkzr-8wde-fkbk
29
url VCID-fu3d-da48-y3ct
vulnerability_id VCID-fu3d-da48-y3ct
summary Unhooking empty PAE entries DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html
7
reference_url http://osvdb.org/87306
reference_id
reference_type
scores
url http://osvdb.org/87306
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4538.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4538.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4538
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16744
published_at 2026-04-16T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16785
published_at 2026-04-01T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16954
published_at 2026-04-02T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1701
published_at 2026-04-04T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16793
published_at 2026-04-07T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16882
published_at 2026-04-08T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16939
published_at 2026-04-09T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16913
published_at 2026-04-11T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16868
published_at 2026-04-12T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.1681
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4538
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538
11
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
12
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
13
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
14
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
15
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
16
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
17
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80025
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80025
19
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
20
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/3
21
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
22
reference_url http://www.securitytracker.com/id?1027762
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027762
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870106
reference_id 870106
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870106
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4538
reference_id CVE-2012-4538
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-4538
28
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
29
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
30
reference_url https://xenbits.xen.org/xsa/advisory-23.html
reference_id XSA-23
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-23.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-4538
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fu3d-da48-y3ct
30
url VCID-g3ss-8y7t-m7ap
vulnerability_id VCID-g3ss-8y7t-m7ap
summary Guest triggerable qemu MSI-X pass-through error messages
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4105.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4105.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4105
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31201
published_at 2026-04-01T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31328
published_at 2026-04-02T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.3137
published_at 2026-04-04T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.3119
published_at 2026-04-07T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31243
published_at 2026-04-08T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31273
published_at 2026-04-09T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31278
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31234
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31191
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31224
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4105
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223853
reference_id 1223853
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223853
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
reference_id 787547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
12
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
13
reference_url https://usn.ubuntu.com/2630-1/
reference_id USN-2630-1
reference_type
scores
url https://usn.ubuntu.com/2630-1/
14
reference_url https://xenbits.xen.org/xsa/advisory-130.html
reference_id XSA-130
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-130.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-4105
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g3ss-8y7t-m7ap
31
url VCID-j64d-px9g-qud1
vulnerability_id VCID-j64d-px9g-qud1
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6032.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6032.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6032
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29156
published_at 2026-04-16T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29179
published_at 2026-04-01T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29255
published_at 2026-04-02T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29305
published_at 2026-04-04T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29118
published_at 2026-04-07T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29182
published_at 2026-04-12T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29223
published_at 2026-04-09T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29228
published_at 2026-04-11T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.2913
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6032
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6032
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6032
reference_id CVE-2012-6032
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6032
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6032
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j64d-px9g-qud1
32
url VCID-j9w4-jjad-puhm
vulnerability_id VCID-j9w4-jjad-puhm
summary Unmediated PCI register access in qemu
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4106.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4106
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24687
published_at 2026-04-01T12:55:00Z
1
value 0.00085
scoring_system epss
scoring_elements 0.24764
published_at 2026-04-02T12:55:00Z
2
value 0.00085
scoring_system epss
scoring_elements 0.24803
published_at 2026-04-04T12:55:00Z
3
value 0.00085
scoring_system epss
scoring_elements 0.24575
published_at 2026-04-07T12:55:00Z
4
value 0.00085
scoring_system epss
scoring_elements 0.24645
published_at 2026-04-08T12:55:00Z
5
value 0.00085
scoring_system epss
scoring_elements 0.24692
published_at 2026-04-09T12:55:00Z
6
value 0.00085
scoring_system epss
scoring_elements 0.24707
published_at 2026-04-11T12:55:00Z
7
value 0.00085
scoring_system epss
scoring_elements 0.24666
published_at 2026-04-12T12:55:00Z
8
value 0.00085
scoring_system epss
scoring_elements 0.24609
published_at 2026-04-13T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24622
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1223859
reference_id 1223859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1223859
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
reference_id 787547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787547
12
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
13
reference_url https://usn.ubuntu.com/2630-1/
reference_id USN-2630-1
reference_type
scores
url https://usn.ubuntu.com/2630-1/
14
reference_url https://xenbits.xen.org/xsa/advisory-131.html
reference_id XSA-131
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-131.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-4106
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9w4-jjad-puhm
33
url VCID-jfmu-gcux-y3et
vulnerability_id VCID-jfmu-gcux-y3et
summary x86: inconsistent cachability flags on guest mappings
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178518.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2270.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2270.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2270
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52888
published_at 2026-04-16T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52851
published_at 2026-04-13T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.5277
published_at 2026-04-01T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52793
published_at 2026-04-02T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.5282
published_at 2026-04-04T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52787
published_at 2026-04-07T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52838
published_at 2026-04-08T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52832
published_at 2026-04-09T12:55:00Z
8
value 0.00295
scoring_system epss
scoring_elements 0.52883
published_at 2026-04-11T12:55:00Z
9
value 0.00295
scoring_system epss
scoring_elements 0.52867
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2270
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
13
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
14
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
15
reference_url http://www.securitytracker.com/id/1035042
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035042
16
reference_url http://xenbits.xen.org/xsa/advisory-154.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-154.html
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1304627
reference_id 1304627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1304627
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2270
reference_id CVE-2016-2270
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:C
1
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-2270
25
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
26
reference_url https://xenbits.xen.org/xsa/advisory-154.html
reference_id XSA-154
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-154.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2016-2270
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jfmu-gcux-y3et
34
url VCID-jnab-uhtk-huf6
vulnerability_id VCID-jnab-uhtk-huf6
summary x86: Long latency populate-on-demand operation is not preemptible
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7970.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7970.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7970
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21926
published_at 2026-04-16T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21882
published_at 2026-04-01T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-02T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22097
published_at 2026-04-04T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21873
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21955
published_at 2026-04-08T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22011
published_at 2026-04-09T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22025
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.21984
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7970
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
19
reference_url http://support.citrix.com/article/CTX202404
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX202404
20
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
21
reference_url http://www.securityfocus.com/bid/77362
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77362
22
reference_url http://www.securitytracker.com/id/1034034
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034034
23
reference_url http://xenbits.xen.org/xsa/advisory-150.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-150.html
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1272529
reference_id 1272529
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1272529
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7970
reference_id CVE-2015-7970
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7970
31
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
32
reference_url https://xenbits.xen.org/xsa/advisory-150.html
reference_id XSA-150
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-150.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7970
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnab-uhtk-huf6
35
url VCID-k6c1-7yj2-myay
vulnerability_id VCID-k6c1-7yj2-myay
summary Memory mapping failure DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html
8
reference_url http://osvdb.org/87307
reference_id
reference_type
scores
url http://osvdb.org/87307
9
reference_url http://rhn.redhat.com/errata/RHSA-2012-1540.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1540.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4537.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4537.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4537
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.2864
published_at 2026-04-16T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28667
published_at 2026-04-01T12:55:00Z
2
value 0.00106
scoring_system epss
scoring_elements 0.28752
published_at 2026-04-02T12:55:00Z
3
value 0.00106
scoring_system epss
scoring_elements 0.28799
published_at 2026-04-04T12:55:00Z
4
value 0.00106
scoring_system epss
scoring_elements 0.28606
published_at 2026-04-07T12:55:00Z
5
value 0.00106
scoring_system epss
scoring_elements 0.28671
published_at 2026-04-08T12:55:00Z
6
value 0.00106
scoring_system epss
scoring_elements 0.28712
published_at 2026-04-09T12:55:00Z
7
value 0.00106
scoring_system epss
scoring_elements 0.28713
published_at 2026-04-11T12:55:00Z
8
value 0.00106
scoring_system epss
scoring_elements 0.28669
published_at 2026-04-12T12:55:00Z
9
value 0.00106
scoring_system epss
scoring_elements 0.28621
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4537
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537
13
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
14
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
15
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
16
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
17
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
18
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
19
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
20
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80024
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80024
21
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
22
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/6
23
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
24
reference_url http://www.securitytracker.com/id?1027761
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027761
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870101
reference_id 870101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870101
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4537
reference_id CVE-2012-4537
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4537
42
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
43
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
44
reference_url https://access.redhat.com/errata/RHSA-2012:1540
reference_id RHSA-2012:1540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1540
45
reference_url https://xenbits.xen.org/xsa/advisory-22.html
reference_id XSA-22
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-22.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-4537
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6c1-7yj2-myay
36
url VCID-k8hr-hneg-2baf
vulnerability_id VCID-k8hr-hneg-2baf
summary arm: various unimplemented hypercalls log without rate limiting
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7813.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7813.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7813
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22822
published_at 2026-04-16T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22746
published_at 2026-04-01T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22918
published_at 2026-04-02T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22962
published_at 2026-04-04T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22755
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.2283
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22883
published_at 2026-04-09T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22903
published_at 2026-04-11T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22865
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22809
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
18
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
19
reference_url http://www.securitytracker.com/id/1034029
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034029
20
reference_url http://xenbits.xen.org/xsa/advisory-146.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-146.html
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1271626
reference_id 1271626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1271626
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:rc1:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7813
reference_id CVE-2015-7813
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7813
29
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
30
reference_url https://xenbits.xen.org/xsa/advisory-146.html
reference_id XSA-146
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-146.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7813
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8hr-hneg-2baf
37
url VCID-ksn6-6gex-17hv
vulnerability_id VCID-ksn6-6gex-17hv
summary x86: some pmu and profiling hypercalls log without rate limiting
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7971.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7971.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7971
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21297
published_at 2026-04-16T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-01T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21441
published_at 2026-04-02T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21495
published_at 2026-04-04T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21246
published_at 2026-04-07T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21325
published_at 2026-04-08T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21387
published_at 2026-04-09T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21395
published_at 2026-04-11T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21356
published_at 2026-04-12T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21302
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7971
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
19
reference_url http://support.citrix.com/article/CTX202404
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX202404
20
reference_url http://www.debian.org/security/2015/dsa-3414
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3414
21
reference_url http://www.securityfocus.com/bid/77363
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77363
22
reference_url http://www.securitytracker.com/id/1034035
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034035
23
reference_url http://xenbits.xen.org/xsa/advisory-152.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-152.html
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1272525
reference_id 1272525
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1272525
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.6.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.3.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.4.1:-:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.5.1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.6.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7971
reference_id CVE-2015-7971
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7971
63
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
64
reference_url https://xenbits.xen.org/xsa/advisory-152.html
reference_id XSA-152
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-152.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7971
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksn6-6gex-17hv
38
url VCID-m4fg-qcbu-m7e4
vulnerability_id VCID-m4fg-qcbu-m7e4
summary XENMEM_populate_physmap DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3496.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3496.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3496
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26098
published_at 2026-04-16T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26182
published_at 2026-04-01T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26262
published_at 2026-04-02T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26303
published_at 2026-04-04T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26074
published_at 2026-04-07T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26141
published_at 2026-04-08T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26189
published_at 2026-04-09T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26197
published_at 2026-04-11T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26151
published_at 2026-04-12T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26092
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3496
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=854590
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=854590
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496
12
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
13
reference_url http://secunia.com/advisories/50530
reference_id
reference_type
scores
url http://secunia.com/advisories/50530
14
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
15
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
16
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
17
reference_url http://securitytracker.com/id?1027481
reference_id
reference_type
scores
url http://securitytracker.com/id?1027481
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78267
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78267
19
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
20
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-14_XENMEM_populate_physmap_DoS_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-14_XENMEM_populate_physmap_DoS_vulnerability
21
reference_url http://www.debian.org/security/2012/dsa-2544
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2544
22
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/7
23
reference_url http://www.osvdb.org/85200
reference_id
reference_type
scores
url http://www.osvdb.org/85200
24
reference_url http://www.securityfocus.com/bid/55412
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55412
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851172
reference_id 851172
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851172
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3496
reference_id CVE-2012-3496
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3496
32
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
33
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
34
reference_url https://xenbits.xen.org/xsa/advisory-14.html
reference_id XSA-14
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-14.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-3496
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4fg-qcbu-m7e4
39
url VCID-m5h4-49wd-y7b1
vulnerability_id VCID-m5h4-49wd-y7b1
summary libxl fails to honour readonly flag on disks with qemu-xen
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7311
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20698
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20841
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20898
published_at 2026-04-04T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20613
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20689
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20749
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20768
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20725
published_at 2026-04-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20673
published_at 2026-04-13T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20658
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7311
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6654
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7812
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7813
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7814
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1265269
reference_id 1265269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1265269
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
17
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
18
reference_url https://xenbits.xen.org/xsa/advisory-142.html
reference_id XSA-142
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-142.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-7311
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5h4-49wd-y7b1
40
url VCID-mrv7-87w6-vqdk
vulnerability_id VCID-mrv7-87w6-vqdk
summary pirq range check DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00003.html
5
reference_url http://osvdb.org/87297
reference_id
reference_type
scores
url http://osvdb.org/87297
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4536.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4536.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4536
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24259
published_at 2026-04-16T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24275
published_at 2026-04-01T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24402
published_at 2026-04-02T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24435
published_at 2026-04-04T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24217
published_at 2026-04-07T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24283
published_at 2026-04-08T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24327
published_at 2026-04-09T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24343
published_at 2026-04-11T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.243
published_at 2026-04-12T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24243
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4536
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536
9
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
10
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
11
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
12
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
13
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
14
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
15
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80023
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80023
16
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/2
17
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
18
reference_url http://www.securitytracker.com/id?1027760
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027760
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870096
reference_id 870096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870096
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:2.2.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4536
reference_id CVE-2012-4536
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4536
22
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
23
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
24
reference_url https://xenbits.xen.org/xsa/advisory-21.html
reference_id XSA-21
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-21.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-4536
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrv7-87w6-vqdk
41
url VCID-nb86-6sk5-8yas
vulnerability_id VCID-nb86-6sk5-8yas
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6035.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6035.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6035
reference_id
reference_type
scores
0
value 0.00107
scoring_system epss
scoring_elements 0.28842
published_at 2026-04-16T12:55:00Z
1
value 0.00107
scoring_system epss
scoring_elements 0.28866
published_at 2026-04-01T12:55:00Z
2
value 0.00107
scoring_system epss
scoring_elements 0.28943
published_at 2026-04-02T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28992
published_at 2026-04-04T12:55:00Z
4
value 0.00107
scoring_system epss
scoring_elements 0.28798
published_at 2026-04-07T12:55:00Z
5
value 0.00107
scoring_system epss
scoring_elements 0.28867
published_at 2026-04-08T12:55:00Z
6
value 0.00107
scoring_system epss
scoring_elements 0.28908
published_at 2026-04-09T12:55:00Z
7
value 0.00107
scoring_system epss
scoring_elements 0.28913
published_at 2026-04-11T12:55:00Z
8
value 0.00107
scoring_system epss
scoring_elements 0.28869
published_at 2026-04-12T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.2882
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6035
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6035
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6035
reference_id CVE-2012-6035
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6035
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6035
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nb86-6sk5-8yas
42
url VCID-pncq-kkun-buae
vulnerability_id VCID-pncq-kkun-buae
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6031.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6031.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6031
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18326
published_at 2026-04-16T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18436
published_at 2026-04-01T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18581
published_at 2026-04-02T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18636
published_at 2026-04-04T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18345
published_at 2026-04-07T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18428
published_at 2026-04-08T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.1848
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18432
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18381
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6031
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6031
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6031
reference_id CVE-2012-6031
reference_type
scores
0
value 4.7
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-6031
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6031
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pncq-kkun-buae
43
url VCID-rtgs-1b4s-53d2
vulnerability_id VCID-rtgs-1b4s-53d2
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6034.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6034.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6034
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32134
published_at 2026-04-16T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32099
published_at 2026-04-13T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32226
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32264
published_at 2026-04-04T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32088
published_at 2026-04-07T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32138
published_at 2026-04-08T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32165
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32169
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32131
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6034
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6034
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6034
reference_id CVE-2012-6034
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6034
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6034
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rtgs-1b4s-53d2
44
url VCID-sm96-n11u-t7a9
vulnerability_id VCID-sm96-n11u-t7a9
summary vulnerability in the iret hypercall handler
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4164.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4164
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22216
published_at 2026-04-01T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22383
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22429
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22217
published_at 2026-04-07T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.223
published_at 2026-04-08T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22354
published_at 2026-04-09T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22374
published_at 2026-04-11T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22333
published_at 2026-04-12T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22274
published_at 2026-04-13T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22278
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1226913
reference_id 1226913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1226913
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795721
reference_id 795721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795721
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://xenbits.xen.org/xsa/advisory-136.html
reference_id XSA-136
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-136.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-4164
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sm96-n11u-t7a9
45
url VCID-tagr-5fpf-4bcj
vulnerability_id VCID-tagr-5fpf-4bcj
summary Heap overflow in QEMU PCNET controller, allowing guest->host escape
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3209.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3209
reference_id
reference_type
scores
0
value 0.20573
scoring_system epss
scoring_elements 0.9554
published_at 2026-04-01T12:55:00Z
1
value 0.20573
scoring_system epss
scoring_elements 0.95549
published_at 2026-04-02T12:55:00Z
2
value 0.20573
scoring_system epss
scoring_elements 0.95554
published_at 2026-04-04T12:55:00Z
3
value 0.20573
scoring_system epss
scoring_elements 0.95558
published_at 2026-04-07T12:55:00Z
4
value 0.20573
scoring_system epss
scoring_elements 0.95565
published_at 2026-04-08T12:55:00Z
5
value 0.20573
scoring_system epss
scoring_elements 0.95568
published_at 2026-04-09T12:55:00Z
6
value 0.20573
scoring_system epss
scoring_elements 0.95572
published_at 2026-04-11T12:55:00Z
7
value 0.20573
scoring_system epss
scoring_elements 0.95573
published_at 2026-04-12T12:55:00Z
8
value 0.20573
scoring_system epss
scoring_elements 0.95574
published_at 2026-04-13T12:55:00Z
9
value 0.20573
scoring_system epss
scoring_elements 0.95583
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1225882
reference_id 1225882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1225882
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788460
reference_id 788460
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=788460
12
reference_url https://security.gentoo.org/glsa/201510-02
reference_id GLSA-201510-02
reference_type
scores
url https://security.gentoo.org/glsa/201510-02
13
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
14
reference_url https://access.redhat.com/errata/RHSA-2015:1087
reference_id RHSA-2015:1087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1087
15
reference_url https://access.redhat.com/errata/RHSA-2015:1088
reference_id RHSA-2015:1088
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1088
16
reference_url https://access.redhat.com/errata/RHSA-2015:1089
reference_id RHSA-2015:1089
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1089
17
reference_url https://access.redhat.com/errata/RHSA-2015:1189
reference_id RHSA-2015:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1189
18
reference_url https://usn.ubuntu.com/2630-1/
reference_id USN-2630-1
reference_type
scores
url https://usn.ubuntu.com/2630-1/
19
reference_url https://xenbits.xen.org/xsa/advisory-135.html
reference_id XSA-135
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-135.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-3209
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tagr-5fpf-4bcj
46
url VCID-ucny-a3xb-pfgc
vulnerability_id VCID-ucny-a3xb-pfgc
summary hypercall physdev_get_free_pirq vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
5
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3495.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3495.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3495
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23776
published_at 2026-04-16T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23783
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23904
published_at 2026-04-02T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23944
published_at 2026-04-04T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23733
published_at 2026-04-07T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23804
published_at 2026-04-08T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.2385
published_at 2026-04-09T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23865
published_at 2026-04-11T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.23821
published_at 2026-04-12T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.23764
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3495
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495
9
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
10
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
11
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
12
reference_url http://support.citrix.com/article/CTX134708
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX134708
13
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-13_hypercall_physdev_get_free_pirq_vulnerability
14
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/6
15
reference_url http://www.securityfocus.com/bid/55406
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55406
16
reference_url http://www.securitytracker.com/id?1027480
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027480
17
reference_url http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593
reference_id
reference_type
scores
url http://xenbits.xen.org/hg/xen-4.1-testing.hg/rev/6779ddca8593
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=851165
reference_id 851165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=851165
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:fp1:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:5.6:sp2:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3495
reference_id CVE-2012-3495
reference_type
scores
0
value 6.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3495
32
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
33
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
34
reference_url https://xenbits.xen.org/xsa/advisory-13.html
reference_id XSA-13
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-13.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-3495
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucny-a3xb-pfgc
47
url VCID-us1d-sdm8-sbh6
vulnerability_id VCID-us1d-sdm8-sbh6
summary paravirtualized drivers incautious about shared memory contents
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8550.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8550.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8550
reference_id
reference_type
scores
0
value 0.15964
scoring_system epss
scoring_elements 0.94774
published_at 2026-04-16T12:55:00Z
1
value 0.15964
scoring_system epss
scoring_elements 0.94766
published_at 2026-04-13T12:55:00Z
2
value 0.15964
scoring_system epss
scoring_elements 0.9473
published_at 2026-04-01T12:55:00Z
3
value 0.15964
scoring_system epss
scoring_elements 0.9474
published_at 2026-04-02T12:55:00Z
4
value 0.15964
scoring_system epss
scoring_elements 0.94743
published_at 2026-04-04T12:55:00Z
5
value 0.15964
scoring_system epss
scoring_elements 0.94745
published_at 2026-04-07T12:55:00Z
6
value 0.15964
scoring_system epss
scoring_elements 0.94754
published_at 2026-04-08T12:55:00Z
7
value 0.15964
scoring_system epss
scoring_elements 0.94758
published_at 2026-04-09T12:55:00Z
8
value 0.15964
scoring_system epss
scoring_elements 0.94762
published_at 2026-04-11T12:55:00Z
9
value 0.15964
scoring_system epss
scoring_elements 0.94765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8550
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271
38
reference_url http://www.debian.org/security/2016/dsa-3434
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3434
39
reference_url http://www.debian.org/security/2016/dsa-3471
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3471
40
reference_url http://www.debian.org/security/2016/dsa-3519
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3519
41
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
42
reference_url http://www.securityfocus.com/bid/79592
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79592
43
reference_url http://www.securitytracker.com/id/1034479
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034479
44
reference_url http://xenbits.xen.org/xsa/advisory-155.html
reference_id
reference_type
scores
url http://xenbits.xen.org/xsa/advisory-155.html
45
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289125
reference_id 1289125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289125
46
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809229
reference_id 809229
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809229
47
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
reference_id 823620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823620
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12:sp1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8550
reference_id CVE-2015-8550
reference_type
scores
0
value 5.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:C
1
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8550
51
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
52
reference_url https://usn.ubuntu.com/2846-1/
reference_id USN-2846-1
reference_type
scores
url https://usn.ubuntu.com/2846-1/
53
reference_url https://usn.ubuntu.com/2847-1/
reference_id USN-2847-1
reference_type
scores
url https://usn.ubuntu.com/2847-1/
54
reference_url https://usn.ubuntu.com/2848-1/
reference_id USN-2848-1
reference_type
scores
url https://usn.ubuntu.com/2848-1/
55
reference_url https://usn.ubuntu.com/2849-1/
reference_id USN-2849-1
reference_type
scores
url https://usn.ubuntu.com/2849-1/
56
reference_url https://usn.ubuntu.com/2850-1/
reference_id USN-2850-1
reference_type
scores
url https://usn.ubuntu.com/2850-1/
57
reference_url https://usn.ubuntu.com/2851-1/
reference_id USN-2851-1
reference_type
scores
url https://usn.ubuntu.com/2851-1/
58
reference_url https://usn.ubuntu.com/2853-1/
reference_id USN-2853-1
reference_type
scores
url https://usn.ubuntu.com/2853-1/
59
reference_url https://usn.ubuntu.com/2854-1/
reference_id USN-2854-1
reference_type
scores
url https://usn.ubuntu.com/2854-1/
60
reference_url https://usn.ubuntu.com/2886-2/
reference_id USN-2886-2
reference_type
scores
url https://usn.ubuntu.com/2886-2/
61
reference_url https://usn.ubuntu.com/2891-1/
reference_id USN-2891-1
reference_type
scores
url https://usn.ubuntu.com/2891-1/
62
reference_url https://xenbits.xen.org/xsa/advisory-155.html
reference_id XSA-155
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-155.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-8550
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-us1d-sdm8-sbh6
48
url VCID-uyct-zk7n-sbcz
vulnerability_id VCID-uyct-zk7n-sbcz
summary QEMU heap overflow flaw while processing certain ATAPI commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5154.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5154
reference_id
reference_type
scores
0
value 0.00388
scoring_system epss
scoring_elements 0.59753
published_at 2026-04-01T12:55:00Z
1
value 0.00388
scoring_system epss
scoring_elements 0.59827
published_at 2026-04-02T12:55:00Z
2
value 0.00388
scoring_system epss
scoring_elements 0.59851
published_at 2026-04-04T12:55:00Z
3
value 0.00388
scoring_system epss
scoring_elements 0.59821
published_at 2026-04-07T12:55:00Z
4
value 0.00388
scoring_system epss
scoring_elements 0.59872
published_at 2026-04-13T12:55:00Z
5
value 0.00388
scoring_system epss
scoring_elements 0.59885
published_at 2026-04-09T12:55:00Z
6
value 0.00388
scoring_system epss
scoring_elements 0.59906
published_at 2026-04-11T12:55:00Z
7
value 0.00388
scoring_system epss
scoring_elements 0.59891
published_at 2026-04-12T12:55:00Z
8
value 0.00388
scoring_system epss
scoring_elements 0.5991
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3214
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1243563
reference_id 1243563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1243563
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793811
reference_id 793811
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=793811
9
reference_url https://security.gentoo.org/glsa/201510-02
reference_id GLSA-201510-02
reference_type
scores
url https://security.gentoo.org/glsa/201510-02
10
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1507
reference_id RHSA-2015:1507
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1507
12
reference_url https://access.redhat.com/errata/RHSA-2015:1508
reference_id RHSA-2015:1508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1508
13
reference_url https://access.redhat.com/errata/RHSA-2015:1512
reference_id RHSA-2015:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1512
14
reference_url https://usn.ubuntu.com/2692-1/
reference_id USN-2692-1
reference_type
scores
url https://usn.ubuntu.com/2692-1/
15
reference_url https://xenbits.xen.org/xsa/advisory-138.html
reference_id XSA-138
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-138.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-5154
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uyct-zk7n-sbcz
49
url VCID-v516-ebvk-zfap
vulnerability_id VCID-v516-ebvk-zfap
summary
Multiple vulnerabilities have been found in Xen, allowing attackers
    on a Xen Virtual Machine to execute arbitrary code, cause Denial of
    Service, or gain access to data on the host.
references
0
reference_url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
1
reference_url http://osvdb.org/85199
reference_id
reference_type
scores
url http://osvdb.org/85199
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6033.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6033.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6033
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21591
published_at 2026-04-16T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21567
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21737
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21792
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21543
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.2162
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21678
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21689
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21651
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21594
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6033
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6033
5
reference_url http://secunia.com/advisories/50472
reference_id
reference_type
scores
url http://secunia.com/advisories/50472
6
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
7
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
9
reference_url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
reference_id
reference_type
scores
url http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
10
reference_url http://www.openwall.com/lists/oss-security/2012/09/05/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/05/8
11
reference_url http://www.securityfocus.com/bid/55410
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55410
12
reference_url http://www.securitytracker.com/id?1027482
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027482
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
reference_id 686764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686764
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6033
reference_id CVE-2012-6033
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-6033
18
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
19
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-6033
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v516-ebvk-zfap
50
url VCID-vq33-jrrb-7kgk
vulnerability_id VCID-vq33-jrrb-7kgk
summary Grant table hypercall infinite loop DoS vulnerability
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
7
reference_url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
reference_id
reference_type
scores
url http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4539.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4539.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4539
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.2247
published_at 2026-04-16T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22399
published_at 2026-04-01T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22566
published_at 2026-04-02T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22609
published_at 2026-04-04T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22396
published_at 2026-04-07T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22477
published_at 2026-04-08T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22532
published_at 2026-04-09T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.2255
published_at 2026-04-11T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22509
published_at 2026-04-12T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22455
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4539
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539
11
reference_url http://secunia.com/advisories/51200
reference_id
reference_type
scores
url http://secunia.com/advisories/51200
12
reference_url http://secunia.com/advisories/51324
reference_id
reference_type
scores
url http://secunia.com/advisories/51324
13
reference_url http://secunia.com/advisories/51352
reference_id
reference_type
scores
url http://secunia.com/advisories/51352
14
reference_url http://secunia.com/advisories/51413
reference_id
reference_type
scores
url http://secunia.com/advisories/51413
15
reference_url http://secunia.com/advisories/51468
reference_id
reference_type
scores
url http://secunia.com/advisories/51468
16
reference_url http://secunia.com/advisories/55082
reference_id
reference_type
scores
url http://secunia.com/advisories/55082
17
reference_url http://security.gentoo.org/glsa/glsa-201309-24.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201309-24.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
19
reference_url http://www.debian.org/security/2012/dsa-2582
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2582
20
reference_url http://www.openwall.com/lists/oss-security/2012/11/13/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/13/4
21
reference_url http://www.osvdb.org/87305
reference_id
reference_type
scores
url http://www.osvdb.org/87305
22
reference_url http://www.securityfocus.com/bid/56498
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56498
23
reference_url http://www.securitytracker.com/id?1027763
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027763
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=870110
reference_id 870110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=870110
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4539
reference_id CVE-2012-4539
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4539
36
reference_url https://security.gentoo.org/glsa/201309-24
reference_id GLSA-201309-24
reference_type
scores
url https://security.gentoo.org/glsa/201309-24
37
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
38
reference_url https://xenbits.xen.org/xsa/advisory-24.html
reference_id XSA-24
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-24.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2012-4539
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vq33-jrrb-7kgk
51
url VCID-yzmc-turm-ffds
vulnerability_id VCID-yzmc-turm-ffds
summary GNTTABOP_swap_grant_ref operation misbehavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4163
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31139
published_at 2026-04-01T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31264
published_at 2026-04-02T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31306
published_at 2026-04-04T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31125
published_at 2026-04-07T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31178
published_at 2026-04-08T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31209
published_at 2026-04-09T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31214
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31171
published_at 2026-04-12T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31127
published_at 2026-04-13T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.3116
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4163
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1226290
reference_id 1226290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1226290
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795721
reference_id 795721
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795721
11
reference_url https://security.gentoo.org/glsa/201604-03
reference_id GLSA-201604-03
reference_type
scores
url https://security.gentoo.org/glsa/201604-03
12
reference_url https://xenbits.xen.org/xsa/advisory-134.html
reference_id XSA-134
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-134.html
fixed_packages
0
url pkg:ebuild/app-emulation/pvgrub@4.6.0
purl pkg:ebuild/app-emulation/pvgrub@4.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0
1
url pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
purl pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0-r9
aliases CVE-2015-4163
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yzmc-turm-ffds
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/pvgrub@4.6.0