Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
Typedeb
Namespacedebian
Namexen
Version4.17.2+76-ge1f9cb16e2-1~deb12u1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.17.2+76-ge1f9cb16e2-1
Latest_non_vulnerable_version4.20.2+7-g1badcf5035-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3bw4-631f-e7h6
vulnerability_id VCID-3bw4-631f-e7h6
summary arm32: The cache may not be properly cleaned/invalidated
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34321
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17171
published_at 2026-04-24T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17266
published_at 2026-04-21T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17232
published_at 2026-04-18T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17324
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17383
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17395
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17345
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17287
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17226
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954
reference_id 1051954
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954
3
reference_url https://xenbits.xenproject.org/xsa/advisory-437.html
reference_id advisory-437.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T15:52:01Z/
url https://xenbits.xenproject.org/xsa/advisory-437.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-437.html
reference_id XSA-437
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-437.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34321, XSA-437
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bw4-631f-e7h6
1
url VCID-5ktg-bhh1-ubbz
vulnerability_id VCID-5ktg-bhh1-ubbz
summary arm: Guests can trigger a deadlock on Cortex-A77
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34320
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28435
published_at 2026-04-24T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28734
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28782
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28589
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28655
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28695
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28697
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28653
published_at 2026-04-12T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28605
published_at 2026-04-13T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28625
published_at 2026-04-16T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.286
published_at 2026-04-18T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28551
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34320
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-436.html
reference_id XSA-436
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-436.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34320, XSA-436
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktg-bhh1-ubbz
2
url VCID-6dax-cddv-7bbs
vulnerability_id VCID-6dax-cddv-7bbs
summary x86/AMD: Debug Mask handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34328
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29742
published_at 2026-04-24T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29998
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.2986
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29921
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29963
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29916
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29867
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34328
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-444.html
reference_id XSA-444
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-444.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34328, XSA-444
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dax-cddv-7bbs
3
url VCID-6jqj-2qwn-8qd9
vulnerability_id VCID-6jqj-2qwn-8qd9
summary x86/AMD: Debug Mask handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34327
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29742
published_at 2026-04-24T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29998
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-16T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-18T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-21T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-04T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.2986
published_at 2026-04-07T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29921
published_at 2026-04-08T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-09T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29963
published_at 2026-04-11T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29916
published_at 2026-04-12T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29867
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34327
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-444.html
reference_id advisory-444.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:36:52Z/
url https://xenbits.xenproject.org/xsa/advisory-444.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-444.html
reference_id XSA-444
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-444.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34327
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jqj-2qwn-8qd9
4
url VCID-8k1q-b2kj-w7hh
vulnerability_id VCID-8k1q-b2kj-w7hh
summary Multiple vulnerabilities in libfsimage disk handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34325
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21301
published_at 2026-04-24T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21614
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21475
published_at 2026-04-16T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.2148
published_at 2026-04-18T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21449
published_at 2026-04-21T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21671
published_at 2026-04-04T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21426
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21503
published_at 2026-04-08T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21562
published_at 2026-04-09T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21573
published_at 2026-04-11T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21535
published_at 2026-04-12T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21479
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-443.html
reference_id advisory-443.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-30T18:38:25Z/
url https://xenbits.xenproject.org/xsa/advisory-443.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-443.html
reference_id XSA-443
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-443.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34325, XSA-443
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1q-b2kj-w7hh
5
url VCID-8tv5-zxmm-r3fk
vulnerability_id VCID-8tv5-zxmm-r3fk
summary x86/AMD: Divide speculative information leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20588
reference_id
reference_type
scores
0
value 0.06701
scoring_system epss
scoring_elements 0.91275
published_at 2026-04-21T12:55:00Z
1
value 0.06701
scoring_system epss
scoring_elements 0.91286
published_at 2026-04-24T12:55:00Z
2
value 0.07781
scoring_system epss
scoring_elements 0.91947
published_at 2026-04-07T12:55:00Z
3
value 0.07781
scoring_system epss
scoring_elements 0.91965
published_at 2026-04-09T12:55:00Z
4
value 0.07781
scoring_system epss
scoring_elements 0.91933
published_at 2026-04-02T12:55:00Z
5
value 0.07781
scoring_system epss
scoring_elements 0.9194
published_at 2026-04-04T12:55:00Z
6
value 0.07781
scoring_system epss
scoring_elements 0.9196
published_at 2026-04-08T12:55:00Z
7
value 0.07781
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-18T12:55:00Z
8
value 0.07781
scoring_system epss
scoring_elements 0.91983
published_at 2026-04-16T12:55:00Z
9
value 0.07781
scoring_system epss
scoring_elements 0.91963
published_at 2026-04-13T12:55:00Z
10
value 0.07781
scoring_system epss
scoring_elements 0.91967
published_at 2026-04-12T12:55:00Z
11
value 0.07781
scoring_system epss
scoring_elements 0.91968
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url http://www.openwall.com/lists/oss-security/2023/09/27/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/27/1
35
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/1
36
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/12
37
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/13
38
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/14
reference_id 14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/14
39
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/15
reference_id 15
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/15
40
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/16
reference_id 16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/16
41
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/2
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230125
reference_id 2230125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230125
43
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/3
44
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/3
45
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/4
reference_id 4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/4
46
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/4
reference_id 4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/4
47
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/5
reference_id 5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/5
48
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/5
reference_id 5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/5
49
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/7
50
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/8
51
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/8
52
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/9
53
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/9
54
reference_url http://xenbits.xen.org/xsa/advisory-439.html
reference_id advisory-439.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://xenbits.xen.org/xsa/advisory-439.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/
reference_id AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/
56
reference_url https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007
reference_id AMD-SB-7007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007
57
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/
reference_id DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/
58
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://www.debian.org/security/2023/dsa-5480
59
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://www.debian.org/security/2023/dsa-5492
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/
reference_id KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/
61
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
62
reference_url https://security.netapp.com/advisory/ntap-20240531-0005/
reference_id ntap-20240531-0005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://security.netapp.com/advisory/ntap-20240531-0005/
63
reference_url https://usn.ubuntu.com/6383-1/
reference_id USN-6383-1
reference_type
scores
url https://usn.ubuntu.com/6383-1/
64
reference_url https://usn.ubuntu.com/6384-1/
reference_id USN-6384-1
reference_type
scores
url https://usn.ubuntu.com/6384-1/
65
reference_url https://usn.ubuntu.com/6386-1/
reference_id USN-6386-1
reference_type
scores
url https://usn.ubuntu.com/6386-1/
66
reference_url https://usn.ubuntu.com/6386-2/
reference_id USN-6386-2
reference_type
scores
url https://usn.ubuntu.com/6386-2/
67
reference_url https://usn.ubuntu.com/6386-3/
reference_id USN-6386-3
reference_type
scores
url https://usn.ubuntu.com/6386-3/
68
reference_url https://usn.ubuntu.com/6387-1/
reference_id USN-6387-1
reference_type
scores
url https://usn.ubuntu.com/6387-1/
69
reference_url https://usn.ubuntu.com/6387-2/
reference_id USN-6387-2
reference_type
scores
url https://usn.ubuntu.com/6387-2/
70
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
71
reference_url https://usn.ubuntu.com/6577-1/
reference_id USN-6577-1
reference_type
scores
url https://usn.ubuntu.com/6577-1/
72
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
73
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
74
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
75
reference_url https://xenbits.xen.org/xsa/advisory-439.html
reference_id XSA-439
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-439.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-20588, XSA-439
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv5-zxmm-r3fk
6
url VCID-97zm-r9b6-uqdu
vulnerability_id VCID-97zm-r9b6-uqdu
summary xenstored: A transaction conflict can crash C Xenstored
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34323
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24929
published_at 2026-04-24T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25175
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-16T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-18T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-21T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25216
published_at 2026-04-04T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25055
published_at 2026-04-08T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.251
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25114
published_at 2026-04-11T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25074
published_at 2026-04-12T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.2502
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34323
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-440.html
reference_id advisory-440.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T16:40:56Z/
url https://xenbits.xenproject.org/xsa/advisory-440.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-440.html
reference_id XSA-440
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-440.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34323, XSA-440
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97zm-r9b6-uqdu
7
url VCID-b57c-x3pw-7fb7
vulnerability_id VCID-b57c-x3pw-7fb7
summary top-level shadow reference dropped too early for 64-bit PV guests
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34322
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18196
published_at 2026-04-24T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18518
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18259
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18271
published_at 2026-04-18T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18295
published_at 2026-04-21T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18573
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18279
published_at 2026-04-07T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18362
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18414
published_at 2026-04-11T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18366
published_at 2026-04-12T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18315
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-438.html
reference_id advisory-438.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:50:09Z/
url https://xenbits.xenproject.org/xsa/advisory-438.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-438.html
reference_id XSA-438
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-438.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34322, XSA-438
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b57c-x3pw-7fb7
8
url VCID-bhdk-jmss-4qc8
vulnerability_id VCID-bhdk-jmss-4qc8
summary x86: BTC/SRSO fixes not fully effective
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46836
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05815
published_at 2026-04-24T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05623
published_at 2026-04-16T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05635
published_at 2026-04-18T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05783
published_at 2026-04-21T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05645
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05676
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05703
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-11T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05674
published_at 2026-04-12T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05668
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46836
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
reference_id 1056928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
4
reference_url https://xenbits.xenproject.org/xsa/advisory-446.html
reference_id advisory-446.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:16:12Z/
url https://xenbits.xenproject.org/xsa/advisory-446.html
5
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
6
reference_url https://xenbits.xen.org/xsa/advisory-446.html
reference_id XSA-446
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-446.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-46836, XSA-446
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhdk-jmss-4qc8
9
url VCID-wd4s-jxuf-skbp
vulnerability_id VCID-wd4s-jxuf-skbp
summary x86/AMD: mismatch in IOMMU quarantine page table levels
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46835
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24863
published_at 2026-04-24T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25096
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24955
published_at 2026-04-16T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-18T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.2492
published_at 2026-04-21T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-04T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24909
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24977
published_at 2026-04-08T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25022
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25036
published_at 2026-04-11T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24996
published_at 2026-04-12T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46835
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
reference_id 1056928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
4
reference_url https://xenbits.xenproject.org/xsa/advisory-445.html
reference_id advisory-445.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-12T04:00:28Z/
url https://xenbits.xenproject.org/xsa/advisory-445.html
5
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
6
reference_url https://xenbits.xen.org/xsa/advisory-445.html
reference_id XSA-445
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-445.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-46835, XSA-445
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wd4s-jxuf-skbp
10
url VCID-ye1t-qhtx-sucm
vulnerability_id VCID-ye1t-qhtx-sucm
summary x86/AMD: missing IOMMU TLB flushing
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34326
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28037
published_at 2026-04-24T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28325
published_at 2026-04-02T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28183
published_at 2026-04-16T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28165
published_at 2026-04-18T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.2812
published_at 2026-04-21T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28368
published_at 2026-04-04T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28158
published_at 2026-04-07T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28224
published_at 2026-04-08T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28266
published_at 2026-04-09T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28271
published_at 2026-04-11T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28228
published_at 2026-04-12T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.28169
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34326
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-442.html
reference_id advisory-442.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T20:27:29Z/
url https://xenbits.xenproject.org/xsa/advisory-442.html
4
reference_url https://xenbits.xen.org/xsa/advisory-442.html
reference_id XSA-442
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-442.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B55-g0b56bed864-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B55-g0b56bed864-1%3Fdistro=trixie
1
url pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
purl pkg:deb/debian/xen@4.17.2%2B76-ge1f9cb16e2-1~deb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie
2
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie
3
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie
aliases CVE-2023-34326, XSA-442
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ye1t-qhtx-sucm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.2%252B76-ge1f9cb16e2-1~deb12u1%3Fdistro=trixie