Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943308?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "xen", "version": "4.11.1+92-g6c33308a8d-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.11.3+24-g14b62ab3e5-1", "latest_non_vulnerable_version": "4.20.2+7-g1badcf5035-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4174?format=api", "vulnerability_id": "VCID-61zz-uk19-r7b2", "summary": "x86: Inconsistent PV IOMMU discipline", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17343.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.30739", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31016", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.3086", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31089", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31118", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31125", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31081", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31068", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31049", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17343" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/10" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-288.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-288.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679321", "reference_id": "1679321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679321" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929994", "reference_id": "929994", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929994" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17343", "reference_id": "CVE-2019-17343", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17343" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-288.html", "reference_id": "XSA-288", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-288.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17343" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-61zz-uk19-r7b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4177?format=api", "vulnerability_id": "VCID-85jp-mmaq-n7ck", "summary": "x86: insufficient TLB flushing when using PCID", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17346.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17346.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17346", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39449", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39304", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39584", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39499", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3932", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39621", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39591", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39617", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3958", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39614", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17346" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17346" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/5" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-292.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-292.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679326", "reference_id": "1679326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679326" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929993", "reference_id": "929993", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929993" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17346", "reference_id": "CVE-2019-17346", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17346" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-292.html", "reference_id": "XSA-292", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-292.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17346" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-85jp-mmaq-n7ck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4175?format=api", "vulnerability_id": "VCID-898q-dzb7-3qe7", "summary": "missing preemption in x86 PV page table unvalidation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35055", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35362", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35076", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35412", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35437", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35366", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35391", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35334", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00148", "scoring_system": "epss", "scoring_elements": "0.35373", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17344" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17344", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17344" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/3" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-290.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-290.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679334", "reference_id": "1679334", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679334" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929996", "reference_id": "929996", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929996" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17344", "reference_id": "CVE-2019-17344", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17344" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-290.html", "reference_id": "XSA-290", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-290.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17344" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-898q-dzb7-3qe7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4173?format=api", "vulnerability_id": "VCID-9ed4-5mca-kfdv", "summary": "x86: steal_page violates page_struct access discipline", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29493", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29863", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29725", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29822", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29832", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29786", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29736", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29753", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29731", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17342" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/2" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-287.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-287.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679328", "reference_id": "1679328", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679328" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930001", "reference_id": "930001", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930001" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17342", "reference_id": "CVE-2019-17342", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17342" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-287.html", "reference_id": "XSA-287", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-287.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17342" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ed4-5mca-kfdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4184?format=api", "vulnerability_id": "VCID-9yut-bdsw-gkfy", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12127.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65766", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65777", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782", "reference_id": "1667782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12127" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9yut-bdsw-gkfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4176?format=api", "vulnerability_id": "VCID-g9hd-27my-6baj", "summary": "x86/PV: page type reference counting issue with failed IOMMU update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17345.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17345.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17345", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22631", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22493", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22704", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22501", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22848", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22639", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22765", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22707", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17345" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/4" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-291.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-291.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685570", "reference_id": "1685570", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685570" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929995", "reference_id": "929995", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929995" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17345", "reference_id": "CVE-2019-17345", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17345" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-291.html", "reference_id": "XSA-291", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-291.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17345" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g9hd-27my-6baj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4186?format=api", "vulnerability_id": "VCID-k45n-139y-pyeq", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11091.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82262", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.8227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82282", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82276", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82312", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82314", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82335", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01697", "scoring_system": "epss", "scoring_elements": "0.82346", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11091" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312", "reference_id": "1705312", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-11091" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k45n-139y-pyeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4170?format=api", "vulnerability_id": "VCID-km9e-c58c-jkbp", "summary": "grant table transfer issues on large hosts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17340.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22805", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23015", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22977", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2281", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23166", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23031", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23103", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23067", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23023", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17340" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/1" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-284.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-284.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771349", "reference_id": "1771349", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771349" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929991", "reference_id": "929991", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929991" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17340", "reference_id": "CVE-2019-17340", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17340" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-284.html", "reference_id": "XSA-284", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-284.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17340" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-km9e-c58c-jkbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4178?format=api", "vulnerability_id": "VCID-pv8w-7nk4-u3eg", "summary": "x86: PV kernel context switch corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17347.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17347.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17347", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21292", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21158", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21315", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2129", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21155", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21502", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21333", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21364", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.2131", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21306", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17347" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17347" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/8" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-293.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-293.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771444", "reference_id": "1771444", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771444" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929999", "reference_id": "929999", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929999" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17347", "reference_id": "CVE-2019-17347", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17347" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-293.html", "reference_id": "XSA-293", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-293.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17347" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pv8w-7nk4-u3eg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4179?format=api", "vulnerability_id": "VCID-r1ca-najr-xuh6", "summary": "x86 shadow: Insufficient TLB flushing when using PCID", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17348.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17348.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17348", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40862", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.4093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40851", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40759", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40944", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40973", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40948", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40955", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40919", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0019", "scoring_system": "epss", "scoring_elements": "0.40961", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17348" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17348" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/7" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-294.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-294.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683956", "reference_id": "1683956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683956" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929992", "reference_id": "929992", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929992" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17348", "reference_id": "CVE-2019-17348", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17348" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-294.html", "reference_id": "XSA-294", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-294.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17348", "XSA-294" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r1ca-najr-xuh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4183?format=api", "vulnerability_id": "VCID-vh89-pyaz-xbdg", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65634", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65678", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.6573", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65748", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65767", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65753", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65766", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00494", "scoring_system": "epss", "scoring_elements": "0.65777", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781", "reference_id": "1646781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12126", "XSA-297" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vh89-pyaz-xbdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4185?format=api", "vulnerability_id": "VCID-z9r8-s6v7-zkgd", "summary": "Microarchitectural Data Sampling speculative side channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12130.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67464", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.675", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67551", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67565", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67588", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67568", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67541", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70693", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00642", "scoring_system": "epss", "scoring_elements": "0.70683", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784", "reference_id": "1646784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129", "reference_id": "929129", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929129" }, { "reference_url": "https://security.gentoo.org/glsa/202003-56", "reference_id": "GLSA-202003-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202003-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1155", "reference_id": "RHSA-2019:1155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1167", "reference_id": "RHSA-2019:1167", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1167" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1168", "reference_id": "RHSA-2019:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1169", "reference_id": "RHSA-2019:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1169" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1170", "reference_id": "RHSA-2019:1170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1171", "reference_id": "RHSA-2019:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1172", "reference_id": "RHSA-2019:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1172" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1174", "reference_id": "RHSA-2019:1174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1175", "reference_id": "RHSA-2019:1175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1175" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1176", "reference_id": "RHSA-2019:1176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1176" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1177", "reference_id": "RHSA-2019:1177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1177" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1178", "reference_id": "RHSA-2019:1178", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1178" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1179", "reference_id": "RHSA-2019:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1180", "reference_id": "RHSA-2019:1180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1181", "reference_id": "RHSA-2019:1181", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1181" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1182", "reference_id": "RHSA-2019:1182", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1182" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1183", "reference_id": "RHSA-2019:1183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1184", "reference_id": "RHSA-2019:1184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1185", "reference_id": "RHSA-2019:1185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1186", "reference_id": "RHSA-2019:1186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1187", "reference_id": "RHSA-2019:1187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1188", "reference_id": "RHSA-2019:1188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1189", "reference_id": "RHSA-2019:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1190", "reference_id": "RHSA-2019:1190", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1193", "reference_id": "RHSA-2019:1193", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1193" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1194", "reference_id": "RHSA-2019:1194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1195", "reference_id": "RHSA-2019:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1196", "reference_id": "RHSA-2019:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1197", "reference_id": "RHSA-2019:1197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1198", "reference_id": "RHSA-2019:1198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1199", "reference_id": "RHSA-2019:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1200", "reference_id": "RHSA-2019:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1201", "reference_id": "RHSA-2019:1201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1202", "reference_id": "RHSA-2019:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1203", "reference_id": "RHSA-2019:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1203" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1204", "reference_id": "RHSA-2019:1204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1205", "reference_id": "RHSA-2019:1205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1206", "reference_id": "RHSA-2019:1206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1207", "reference_id": "RHSA-2019:1207", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1207" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1208", "reference_id": "RHSA-2019:1208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1209", "reference_id": "RHSA-2019:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1455", "reference_id": "RHSA-2019:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1455" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2553", "reference_id": "RHSA-2019:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2553" }, { "reference_url": "https://usn.ubuntu.com/3977-1/", "reference_id": "USN-3977-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-1/" }, { "reference_url": "https://usn.ubuntu.com/3977-2/", "reference_id": "USN-3977-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-2/" }, { "reference_url": "https://usn.ubuntu.com/3977-3/", "reference_id": "USN-3977-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3977-3/" }, { "reference_url": "https://usn.ubuntu.com/3978-1/", "reference_id": "USN-3978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3978-1/" }, { "reference_url": "https://usn.ubuntu.com/3979-1/", "reference_id": "USN-3979-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3979-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-1/", "reference_id": "USN-3980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-1/" }, { "reference_url": "https://usn.ubuntu.com/3980-2/", "reference_id": "USN-3980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3980-2/" }, { "reference_url": "https://usn.ubuntu.com/3981-1/", "reference_id": "USN-3981-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-1/" }, { "reference_url": "https://usn.ubuntu.com/3981-2/", "reference_id": "USN-3981-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3981-2/" }, { "reference_url": "https://usn.ubuntu.com/3982-1/", "reference_id": "USN-3982-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-1/" }, { "reference_url": "https://usn.ubuntu.com/3982-2/", "reference_id": "USN-3982-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3982-2/" }, { "reference_url": "https://usn.ubuntu.com/3983-1/", "reference_id": "USN-3983-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-1/" }, { "reference_url": "https://usn.ubuntu.com/3983-2/", "reference_id": "USN-3983-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3983-2/" }, { "reference_url": "https://usn.ubuntu.com/3984-1/", "reference_id": "USN-3984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3984-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-1/", "reference_id": "USN-3985-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-1/" }, { "reference_url": "https://usn.ubuntu.com/3985-2/", "reference_id": "USN-3985-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3985-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-297.html", "reference_id": "XSA-297", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-297.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-12130" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9r8-s6v7-zkgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4171?format=api", "vulnerability_id": "VCID-zh3b-cxzx-abc6", "summary": "race with pass-through device hotplug", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17341.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17341.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17341", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28384", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28038", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28246", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2815", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28458", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.285", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28291", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.284", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28403", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2836", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28302", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28313", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28292", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17341" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17341", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17341" }, { "reference_url": "https://seclists.org/bugtraq/2020/Jan/21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2020/Jan/21" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2020/dsa-4602" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/10/25/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2019/10/25/6" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-285.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xenbits.xen.org/xsa/advisory-285.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679332", "reference_id": "1679332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1679332" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929998", "reference_id": "929998", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929998" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17341", "reference_id": "CVE-2019-17341", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17341" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-285.html", "reference_id": "XSA-285", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-285.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943308?format=api", "purl": "pkg:deb/debian/xen@4.11.1%2B92-g6c33308a8d-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17341" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zh3b-cxzx-abc6" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.1%252B92-g6c33308a8d-1%3Fdistro=trixie" }