Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943325?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "xen", "version": "4.16.2-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.16.2+90-g0d39a6d1ae-1", "latest_non_vulnerable_version": "4.20.2+7-g1badcf5035-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4325?format=api", "vulnerability_id": "VCID-2uap-2vm1-efcr", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80558", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80517", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226", "reference_id": "2090226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226" }, { "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037", "reference_id": "amd-sb-1037", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/", "reference_id": "MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/" }, { "reference_url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/", "reference_id": "retbleed-intel-and-amd-processor-information-disclosure-vulnerability", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://usn.ubuntu.com/5564-1/", "reference_id": "USN-5564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5564-1/" }, { "reference_url": "https://usn.ubuntu.com/5565-1/", "reference_id": "USN-5565-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5565-1/" }, { "reference_url": "https://usn.ubuntu.com/5566-1/", "reference_id": "USN-5566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5566-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-29900" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4320?format=api", "vulnerability_id": "VCID-4429-qf2w-jqg3", "summary": "x86: MMIO Stale Data vulnerabilities", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40015", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40231", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4027", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40266", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4019", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/06/16/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241", "reference_id": "2090241", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5173", "reference_id": "dsa-5173", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5173" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5178", "reference_id": "dsa-5178", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5184", "reference_id": "dsa-5184", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5184" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/", "reference_id": "FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html", "reference_id": "intel-sa-00615.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/", "reference_id": "MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220624-0008/", "reference_id": "ntap-20220624-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220624-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5937", "reference_id": "RHSA-2022:5937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5939", "reference_id": "RHSA-2022:5939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6437", "reference_id": "RHSA-2022:6437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6460", "reference_id": "RHSA-2022:6460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/", "reference_id": "RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/", "reference_id": "T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/" }, { "reference_url": "https://usn.ubuntu.com/5484-1/", "reference_id": "USN-5484-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5484-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-1/", "reference_id": "USN-5485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-2/", "reference_id": "USN-5485-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-2/" }, { "reference_url": "https://usn.ubuntu.com/5486-1/", "reference_id": "USN-5486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5486-1/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5535-1/", "reference_id": "USN-5535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "XSA-404", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-404.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-21166", "XSA-404" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4314?format=api", "vulnerability_id": "VCID-46ad-1k9n-j3hm", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05398", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-26365" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46ad-1k9n-j3hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4316?format=api", "vulnerability_id": "VCID-4cdt-ycjx-6ub4", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05398", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-33741", "XSA-403" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4cdt-ycjx-6ub4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4311?format=api", "vulnerability_id": "VCID-4spa-usqt-93b2", "summary": "x86 pv: Race condition in typeref acquisition", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14641", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14751", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14827", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14739", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14702", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1454", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14546", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1461", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-401.html", "reference_id": "XSA-401", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-401.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-26362", "XSA-401" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4spa-usqt-93b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4326?format=api", "vulnerability_id": "VCID-5cw7-rv5f-jfaq", "summary": "insufficient TLB flush for x86 PV guests in shadow mode", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20801", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20596", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20581", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20568", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20561", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-408.html", "reference_id": "XSA-408", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-408.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943333?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B86-g1c354767d5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B86-g1c354767d5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-33745", "XSA-408" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cw7-rv5f-jfaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4312?format=api", "vulnerability_id": "VCID-7wyt-uh2c-a3ha", "summary": "x86 pv: Insufficient care with non-coherent mappings", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23968", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24084", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2415", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24194", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24213", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24115", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24117", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24093", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-402.html", "reference_id": "XSA-402", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-402.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-26363" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wyt-uh2c-a3ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4318?format=api", "vulnerability_id": "VCID-csy7-esn4-u3gq", "summary": "x86: MMIO Stale Data vulnerabilities", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63755", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63711", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63723", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63754", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63739", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/06/16/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237", "reference_id": "2090237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5173", "reference_id": "dsa-5173", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5173" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5178", "reference_id": "dsa-5178", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5184", "reference_id": "dsa-5184", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5184" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/", "reference_id": "FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html", "reference_id": "intel-sa-00615.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/", "reference_id": "MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220624-0008/", "reference_id": "ntap-20220624-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220624-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5937", "reference_id": "RHSA-2022:5937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5939", "reference_id": "RHSA-2022:5939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6437", "reference_id": "RHSA-2022:6437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6460", "reference_id": "RHSA-2022:6460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/", "reference_id": "RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/", "reference_id": "T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/" }, { "reference_url": "https://usn.ubuntu.com/5484-1/", "reference_id": "USN-5484-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5484-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-1/", "reference_id": "USN-5485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-2/", "reference_id": "USN-5485-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-2/" }, { "reference_url": "https://usn.ubuntu.com/5486-1/", "reference_id": "USN-5486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5486-1/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5535-1/", "reference_id": "USN-5535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "XSA-404", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-404.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-21123" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4313?format=api", "vulnerability_id": "VCID-hg4z-ad3f-fbc2", "summary": "x86 pv: Insufficient care with non-coherent mappings", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28936", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29219", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29125", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29101", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29054", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-402.html", "reference_id": "XSA-402", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-402.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-26364", "XSA-402" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hg4z-ad3f-fbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4315?format=api", "vulnerability_id": "VCID-q3p3-tgay-6kcs", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06314", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06417", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06409", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06332", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06343", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06491", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-33740" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3p3-tgay-6kcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4319?format=api", "vulnerability_id": "VCID-td6e-x2qb-syg3", "summary": "x86: MMIO Stale Data vulnerabilities", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47466", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67507", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67488", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/06/16/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240", "reference_id": "2090240", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "advisory-404.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-404.html" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5173", "reference_id": "dsa-5173", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5173" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5178", "reference_id": "dsa-5178", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5184", "reference_id": "dsa-5184", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5184" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/", "reference_id": "FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html", "reference_id": "intel-sa-00615.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/", "reference_id": "MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220624-0008/", "reference_id": "ntap-20220624-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220624-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5937", "reference_id": "RHSA-2022:5937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5939", "reference_id": "RHSA-2022:5939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6437", "reference_id": "RHSA-2022:6437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6460", "reference_id": "RHSA-2022:6460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/", "reference_id": "RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/", "reference_id": "T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/" }, { "reference_url": "https://usn.ubuntu.com/5484-1/", "reference_id": "USN-5484-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5484-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-1/", "reference_id": "USN-5485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-2/", "reference_id": "USN-5485-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-2/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5535-1/", "reference_id": "USN-5535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "XSA-404", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-404.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-21125" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4317?format=api", "vulnerability_id": "VCID-zkeg-d5d5-vbda", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06317", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06146", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06299", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-33742" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkeg-d5d5-vbda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4324?format=api", "vulnerability_id": "VCID-zkyv-h5at-xkgq", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33638", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33602", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33578", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33387", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153", "reference_id": "2103153", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943326?format=api", "purl": "pkg:deb/debian/xen@4.14.5%2B24-g87d90d511c-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.5%252B24-g87d90d511c-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943265?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943325?format=api", "purl": "pkg:deb/debian/xen@4.16.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943263?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943267?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943266?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-23825", "XSA-407" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.16.2-1%3Fdistro=trixie" }