Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85570?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "type": "ebuild", "namespace": "app-emulation", "name": "xen", "version": "4.7.3", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.9.1-r1", "latest_non_vulnerable_version": "4.17.4", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4105?format=api", "vulnerability_id": "VCID-16hm-nyk9-5uff", "summary": "stale P2M mappings due to insufficient error checking", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10918.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10918.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82201", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.8219", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82135", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458876", "reference_id": "1458876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458876" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-222.html", "reference_id": "XSA-222", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-222.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10918", "XSA-222" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-16hm-nyk9-5uff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4108?format=api", "vulnerability_id": "VCID-1muu-6ytt-jkc5", "summary": "grant table operations mishandle reference counts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10921.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10921.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78357", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78391", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78316", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7836", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878", "reference_id": "1458878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-224.html", "reference_id": "XSA-224", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-224.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10921" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1muu-6ytt-jkc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4100?format=api", "vulnerability_id": "VCID-3863-ejr7-5bfd", "summary": "Races in the grant table unmap code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10913.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10913.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78852", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.7896", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78923", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78953", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78859", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78888", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78869", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78908", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78898", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78927", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458872", "reference_id": "1458872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458872" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-218.html", "reference_id": "XSA-218", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-218.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10913" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3863-ejr7-5bfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4107?format=api", "vulnerability_id": "VCID-4w49-gjvc-mqcy", "summary": "grant table operations mishandle reference counts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10920.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10920.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78398", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78357", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78391", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78284", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78316", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7836", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878", "reference_id": "1458878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-224.html", "reference_id": "XSA-224", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-224.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10920", "XSA-224" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4w49-gjvc-mqcy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4099?format=api", "vulnerability_id": "VCID-mbv9-7v2m-4qf8", "summary": "page transfer may allow PV guest to elevate privilege", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10912.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10912.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82063", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82201", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82168", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.8219", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82095", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82091", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82118", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82135", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82127", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82164", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01672", "scoring_system": "epss", "scoring_elements": "0.82165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458871", "reference_id": "1458871", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458871" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-217.html", "reference_id": "XSA-217", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-217.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10912", "XSA-217" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbv9-7v2m-4qf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4102?format=api", "vulnerability_id": "VCID-nvk7-bptq-5ffh", "summary": "x86: insufficient reference counts during shadow emulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10915.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10915.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65545", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65689", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65662", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65677", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65593", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65659", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.65666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00492", "scoring_system": "epss", "scoring_elements": "0.6568", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458873", "reference_id": "1458873", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458873" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-219.html", "reference_id": "XSA-219", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-219.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10915", "XSA-219" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nvk7-bptq-5ffh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4101?format=api", "vulnerability_id": "VCID-what-pe1h-gfa7", "summary": "Races in the grant table unmap code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10914.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10914.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69495", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.6965", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.6959", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69552", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69568", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.6956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.696", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00603", "scoring_system": "epss", "scoring_elements": "0.69609", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458872", "reference_id": "1458872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458872" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-218.html", "reference_id": "XSA-218", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-218.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10914", "XSA-218" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-what-pe1h-gfa7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4109?format=api", "vulnerability_id": "VCID-zneg-pw5s-abhy", "summary": "grant table operations mishandle reference counts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10922.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10922.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69837", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.6985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.6989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69906", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.6993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69941", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69951", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69984", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00616", "scoring_system": "epss", "scoring_elements": "0.69993", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10912" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10913" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10914" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10915" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10918" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10920" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10921" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878", "reference_id": "1458878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1458878" }, { "reference_url": "https://security.gentoo.org/glsa/201710-17", "reference_id": "GLSA-201710-17", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201710-17" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-224.html", "reference_id": "XSA-224", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-224.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85570?format=api", "purl": "pkg:ebuild/app-emulation/xen@4.7.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" } ], "aliases": [ "CVE-2017-10922" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zneg-pw5s-abhy" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen@4.7.3" }