Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/994412?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "type": "deb", "namespace": "debian", "name": "xen", "version": "4.14.6-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4380?format=api", "vulnerability_id": "VCID-1tb8-t91c-63bp", "summary": "x86: Native Branch History Injection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0878", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08735", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09191", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09057", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09077", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09195", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09194", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/09/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/09/15" }, { "reference_url": "https://www.kb.cert.org/vuls/id/155143", "reference_id": "155143", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://www.kb.cert.org/vuls/id/155143" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268118", "reference_id": "2268118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268118" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/", "reference_id": "6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/07/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/07/7" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-456.html", "reference_id": "advisory-456.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-456.html" }, { "reference_url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm", "reference_id": "branch-history-injection.htm", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/", "reference_id": "D5OK6MH75S7YWD34EWW7QIZTS627RIE3", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/" }, { "reference_url": "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file", "reference_id": "inspectre-gadget?tab=readme-ov-file", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102", "reference_id": "RHSA-2024:5102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6994", "reference_id": "RHSA-2024:6994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6995", "reference_id": "RHSA-2024:6995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8613", "reference_id": "RHSA-2024:8613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8614", "reference_id": "RHSA-2024:8614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8617", "reference_id": "RHSA-2024:8617", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8617" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/", "reference_id": "RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/" }, { "reference_url": "https://usn.ubuntu.com/6766-1/", "reference_id": "USN-6766-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6766-1/" }, { "reference_url": "https://usn.ubuntu.com/6766-2/", "reference_id": "USN-6766-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6766-2/" }, { "reference_url": "https://usn.ubuntu.com/6766-3/", "reference_id": "USN-6766-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6766-3/" }, { "reference_url": "https://usn.ubuntu.com/6774-1/", "reference_id": "USN-6774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6774-1/" }, { "reference_url": "https://usn.ubuntu.com/6795-1/", "reference_id": "USN-6795-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6795-1/" }, { "reference_url": "https://usn.ubuntu.com/6828-1/", "reference_id": "USN-6828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6828-1/" }, { "reference_url": "https://usn.ubuntu.com/6865-1/", "reference_id": "USN-6865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6865-1/" }, { "reference_url": "https://usn.ubuntu.com/6866-1/", "reference_id": "USN-6866-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6866-1/" }, { "reference_url": "https://usn.ubuntu.com/6866-2/", "reference_id": "USN-6866-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6866-2/" }, { "reference_url": "https://usn.ubuntu.com/6866-3/", "reference_id": "USN-6866-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6866-3/" }, { "reference_url": "https://usn.ubuntu.com/6868-1/", "reference_id": "USN-6868-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6868-1/" }, { "reference_url": "https://usn.ubuntu.com/6868-2/", "reference_id": "USN-6868-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6868-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-456.html", "reference_id": "XSA-456", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-456.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-2201", "XSA-456" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tb8-t91c-63bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4405?format=api", "vulnerability_id": "VCID-26a9-9zz3-wfhh", "summary": "x86: Incorrect input sanitisation in Viridian hypercalls", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06221", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07718", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07807", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07654", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-475.html", "reference_id": "advisory-475.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-31T17:45:24Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-475.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-475.html", "reference_id": "XSA-475", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-475.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58147", "XSA-475" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26a9-9zz3-wfhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4399?format=api", "vulnerability_id": "VCID-2trm-w3ww-cfhk", "summary": "Mutiple vulnerabilities in the Viridian interface", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07643", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07611", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08147", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08071", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0811", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08017", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-472.html", "reference_id": "advisory-472.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:25:53Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-472.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-472.html", "reference_id": "XSA-472", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-472.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-27466" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2trm-w3ww-cfhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4359?format=api", "vulnerability_id": "VCID-3bw4-631f-e7h6", "summary": "arm32: The cache may not be properly cleaned/invalidated", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17151", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17232", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17383", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17395", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17287", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17226", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17171", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954", "reference_id": "1051954", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-437.html", "reference_id": "advisory-437.html", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T15:52:01Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-437.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-437.html", "reference_id": "XSA-437", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-437.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34321", "XSA-437" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bw4-631f-e7h6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4382?format=api", "vulnerability_id": "VCID-3se4-qv6j-xqfq", "summary": "double unlock in x86 guest IRQ handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68631", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68621", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68626", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.6849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68558", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71456", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-458.html", "reference_id": "advisory-458.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T13:31:44Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-458.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-458.html", "reference_id": "XSA-458", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-458.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31143", "XSA-458" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3se4-qv6j-xqfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4375?format=api", "vulnerability_id": "VCID-3vdg-5g64-wkbt", "summary": "x86: shadow stack vs exceptions from emulation stubs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19893", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19928", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19923", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20117", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20059", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-451.html", "reference_id": "advisory-451.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-451.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-451.html", "reference_id": "XSA-451", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-451.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/", "reference_id": "ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46841", "XSA-451" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdg-5g64-wkbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4314?format=api", "vulnerability_id": "VCID-46ad-1k9n-j3hm", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05398", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07741", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-26365" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46ad-1k9n-j3hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4316?format=api", "vulnerability_id": "VCID-4cdt-ycjx-6ub4", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05398", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07741", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-33741", "XSA-403" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4cdt-ycjx-6ub4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4387?format=api", "vulnerability_id": "VCID-4k7p-3g95-n7dm", "summary": "Deadlock in x86 HVM standard VGA handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45818", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42152", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42306", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.4234", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42382", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42354", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42403", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42378", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45818" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-463.html", "reference_id": "advisory-463.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:59:24Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-463.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-463.html", "reference_id": "XSA-463", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-463.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-45818", "XSA-463" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4k7p-3g95-n7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4407?format=api", "vulnerability_id": "VCID-4pra-prf3-1uff", "summary": "Incorrect removal of permissions on PCI device unplug", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58149", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11701", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17679", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17836", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1772", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17895", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17847", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17798", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-476.html", "reference_id": "advisory-476.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:24:29Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-476.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-476.html", "reference_id": "XSA-476", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-476.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58149", "XSA-476" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4pra-prf3-1uff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4373?format=api", "vulnerability_id": "VCID-4rmg-db7g-u3hs", "summary": "pci: phantom functions assigned to incorrect contexts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48913", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48959", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49005", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49001", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48955", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48963", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48951", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270533", "reference_id": "2270533", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270533" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-449.html", "reference_id": "advisory-449.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:00:00Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-449.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-449.html", "reference_id": "XSA-449", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-449.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46839", "XSA-449" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4rmg-db7g-u3hs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4358?format=api", "vulnerability_id": "VCID-5ktg-bhh1-ubbz", "summary": "arm: Guests can trigger a deadlock on Cortex-A77", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34320", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28247", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28782", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28655", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28697", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.286", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28435", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28323", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-436.html", "reference_id": "XSA-436", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-436.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34320", "XSA-436" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktg-bhh1-ubbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4391?format=api", "vulnerability_id": "VCID-5u88-jt28-cfb6", "summary": "deadlock potential with VT-d and legacy PCI device pass-through", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25699", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25643", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30582", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30976", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30784", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31009", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44946", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-467.html", "reference_id": "advisory-467.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:17:20Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-467.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-467.html", "reference_id": "XSA-467", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-467.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-1713", "XSA-467" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5u88-jt28-cfb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4368?format=api", "vulnerability_id": "VCID-6dax-cddv-7bbs", "summary": "x86/AMD: Debug Mask handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34328", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29567", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29921", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29958", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29865", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29742", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29629", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34328" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-444.html", "reference_id": "XSA-444", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-444.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34328", "XSA-444" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dax-cddv-7bbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4367?format=api", "vulnerability_id": "VCID-6jqj-2qwn-8qd9", "summary": "x86/AMD: Debug Mask handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34327", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29567", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29742", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29629", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29921", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29958", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29865", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34327" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-444.html", "reference_id": "advisory-444.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:36:52Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-444.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-444.html", "reference_id": "XSA-444", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-444.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34327" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jqj-2qwn-8qd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4365?format=api", "vulnerability_id": "VCID-8k1q-b2kj-w7hh", "summary": "Multiple vulnerabilities in libfsimage disk handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2128", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21449", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21301", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.213", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21671", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21562", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21535", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2148", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-443.html", "reference_id": "advisory-443.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-30T18:38:25Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-443.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-443.html", "reference_id": "XSA-443", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-443.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34325", "XSA-443" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1q-b2kj-w7hh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4361?format=api", "vulnerability_id": "VCID-8tv5-zxmm-r3fk", "summary": "x86/AMD: Divide speculative information leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06701", "scoring_system": "epss", "scoring_elements": "0.91275", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06701", "scoring_system": "epss", "scoring_elements": "0.91286", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06872", "scoring_system": "epss", "scoring_elements": "0.91406", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91965", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91933", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.9194", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.9196", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.9198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91968", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/27/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/12", "reference_id": "12", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/13", "reference_id": "13", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/14", "reference_id": "14", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230125", "reference_id": "2230125", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230125" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-439.html", "reference_id": "advisory-439.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-439.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/", "reference_id": "AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/" }, { "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007", "reference_id": "AMD-SB-7007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/", "reference_id": "DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5480", "reference_id": "dsa-5480", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5480" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5492", "reference_id": "dsa-5492", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5492" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/", "reference_id": "KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0005/", "reference_id": "ntap-20240531-0005", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0005/" }, { "reference_url": "https://usn.ubuntu.com/6383-1/", "reference_id": "USN-6383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6383-1/" }, { "reference_url": "https://usn.ubuntu.com/6384-1/", "reference_id": "USN-6384-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6384-1/" }, { "reference_url": "https://usn.ubuntu.com/6386-1/", "reference_id": "USN-6386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-1/" }, { "reference_url": "https://usn.ubuntu.com/6386-2/", "reference_id": "USN-6386-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-2/" }, { "reference_url": "https://usn.ubuntu.com/6386-3/", "reference_id": "USN-6386-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-3/" }, { "reference_url": "https://usn.ubuntu.com/6387-1/", "reference_id": "USN-6387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6387-1/" }, { "reference_url": "https://usn.ubuntu.com/6387-2/", "reference_id": "USN-6387-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6387-2/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" }, { "reference_url": "https://usn.ubuntu.com/6577-1/", "reference_id": "USN-6577-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6577-1/" }, { "reference_url": "https://usn.ubuntu.com/6602-1/", "reference_id": "USN-6602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6602-1/" }, { "reference_url": "https://usn.ubuntu.com/6604-1/", "reference_id": "USN-6604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6604-1/" }, { "reference_url": "https://usn.ubuntu.com/6604-2/", "reference_id": "USN-6604-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6604-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-439.html", "reference_id": "XSA-439", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-439.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-20588", "XSA-439" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv5-zxmm-r3fk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4362?format=api", "vulnerability_id": "VCID-97zm-r9b6-uqdu", "summary": "xenstored: A transaction conflict can crash C Xenstored", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25175", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24929", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24917", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25216", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25055", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25114", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25074", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2502", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25021", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-440.html", "reference_id": "advisory-440.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T16:40:56Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-440.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-440.html", "reference_id": "XSA-440", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-440.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34323", "XSA-440" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-97zm-r9b6-uqdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4360?format=api", "vulnerability_id": "VCID-b57c-x3pw-7fb7", "summary": "top-level shadow reference dropped too early for 64-bit PV guests", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18143", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18295", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18196", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1818", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18414", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18315", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18271", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-438.html", "reference_id": "advisory-438.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:50:09Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-438.html", "reference_id": "XSA-438", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-438.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34322", "XSA-438" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b57c-x3pw-7fb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4370?format=api", "vulnerability_id": "VCID-bhdk-jmss-4qc8", "summary": "x86: BTC/SRSO fixes not fully effective", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05862", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05783", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05815", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05852", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05645", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05674", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05668", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05635", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928", "reference_id": "1056928", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-446.html", "reference_id": "advisory-446.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:16:12Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-446.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-446.html", "reference_id": "XSA-446", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-446.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46836", "XSA-446" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhdk-jmss-4qc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4377?format=api", "vulnerability_id": "VCID-byu1-7n9c-5fes", "summary": "GhostRace: Speculative Race Conditions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2193", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75714", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75658", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75697", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75702", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/12/14", "reference_id": "14", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/03/12/14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262051", "reference_id": "2262051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262051" }, { "reference_url": "https://kb.cert.org/vuls/id/488902", "reference_id": "488902", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://kb.cert.org/vuls/id/488902" }, { "reference_url": "https://www.kb.cert.org/vuls/id/488902", "reference_id": "488902", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://www.kb.cert.org/vuls/id/488902" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html", "reference_id": "amd-sb-7016.html", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/", "reference_id": "EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/" }, { "reference_url": "https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace", "reference_id": "ghostrace", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace" }, { "reference_url": "https://www.vusec.net/projects/ghostrace/", "reference_id": "ghostrace", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://www.vusec.net/projects/ghostrace/" }, { "reference_url": "https://download.vusec.net/papers/ghostrace_sec24.pdf", "reference_id": "ghostrace_sec24.pdf", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://download.vusec.net/papers/ghostrace_sec24.pdf" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/", "reference_id": "H63LGAQXPEVJOES73U4XK65I6DASOAAG", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23", "reference_id": "?id=944d5fe50f3f03daacfea16300e656a1691c4a23", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-453.html", "reference_id": "XSA-453", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://xenbits.xen.org/xsa/advisory-453.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/", "reference_id": "ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-2193", "XSA-453" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byu1-7n9c-5fes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4403?format=api", "vulnerability_id": "VCID-c4xu-szkm-1kh6", "summary": "Arm issues with page refcounting", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13617", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13724", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13813", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13836", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13805", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14679", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14515", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14697", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14757", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14609", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-473.html", "reference_id": "advisory-473.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:39:37Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-473.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-473.html", "reference_id": "XSA-473", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-473.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58145" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4xu-szkm-1kh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4384?format=api", "vulnerability_id": "VCID-ee3z-24pr-kqcm", "summary": "error handling in x86 IOMMU identity mapping", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21966", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21953", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2215", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-460.html", "reference_id": "advisory-460.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:27:44Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-460.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-460.html", "reference_id": "XSA-460", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-460.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31145", "XSA-460" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee3z-24pr-kqcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4395?format=api", "vulnerability_id": "VCID-ejhc-6yqt-gkgv", "summary": "x86: Indirect Target Selection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28956", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25696", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25764", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25806", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25706", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.4551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45557", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45419", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45368", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45505", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172", "reference_id": "1105172", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193", "reference_id": "1105193", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366125", "reference_id": "2366125", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366125" }, { "reference_url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html", "reference_id": "intel-sa-01153.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "5.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/" } ], "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10101", "reference_id": "RHSA-2025:10101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10102", "reference_id": "RHSA-2025:10102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10103", "reference_id": "RHSA-2025:10103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10107", "reference_id": "RHSA-2025:10107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10108", "reference_id": "RHSA-2025:10108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10109", "reference_id": "RHSA-2025:10109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10111", "reference_id": "RHSA-2025:10111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10126", "reference_id": "RHSA-2025:10126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10162", "reference_id": "RHSA-2025:10162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10991", "reference_id": "RHSA-2025:10991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13962", "reference_id": "RHSA-2025:13962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19962", "reference_id": "RHSA-2025:19962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://usn.ubuntu.com/7535-1/", "reference_id": "USN-7535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-469.html", "reference_id": "XSA-469", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-469.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-28956", "XSA-469" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4385?format=api", "vulnerability_id": "VCID-evcg-2z3p-gbch", "summary": "PCI device pass-through with shared resources", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21966", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21953", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2215", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-461.html", "reference_id": "advisory-461.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:14:46Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-461.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-461.html", "reference_id": "XSA-461", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-461.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31146" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evcg-2z3p-gbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4406?format=api", "vulnerability_id": "VCID-h9hz-vur7-kyhg", "summary": "x86: Incorrect input sanitisation in Viridian hypercalls", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58148", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06221", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07718", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07807", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07654", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-475.html", "reference_id": "advisory-475.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:25:18Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-475.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-475.html", "reference_id": "XSA-475", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-475.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58148" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9hz-vur7-kyhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4397?format=api", "vulnerability_id": "VCID-j22f-mbqe-a7dk", "summary": "x86: Transitive Scheduler Attacks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36350", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01827", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01788", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01783", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02204", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09372", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0942", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09405", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09385", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035", "reference_id": "1109035", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350725", "reference_id": "2350725", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350725" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html", "reference_id": "amd-sb-7029.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T20:23:14Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19930", "reference_id": "RHSA-2025:19930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://usn.ubuntu.com/7833-1/", "reference_id": "USN-7833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-1/" }, { "reference_url": "https://usn.ubuntu.com/7833-2/", "reference_id": "USN-7833-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-2/" }, { "reference_url": "https://usn.ubuntu.com/7833-3/", "reference_id": "USN-7833-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-3/" }, { "reference_url": "https://usn.ubuntu.com/7833-4/", "reference_id": "USN-7833-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-4/" }, { "reference_url": "https://usn.ubuntu.com/7834-1/", "reference_id": "USN-7834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7834-1/" }, { "reference_url": "https://usn.ubuntu.com/7848-1/", "reference_id": "USN-7848-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7848-1/" }, { "reference_url": "https://usn.ubuntu.com/7856-1/", "reference_id": "USN-7856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7856-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-471.html", "reference_id": "XSA-471", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-471.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-36350" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j22f-mbqe-a7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4376?format=api", "vulnerability_id": "VCID-p2fk-8snj-x7dy", "summary": "x86: Register File Data Sampling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14976", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15014", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15419", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15947", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15693", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15761", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15746", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108", "reference_id": "1066108", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/12/13", "reference_id": "13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/03/12/13" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270700", "reference_id": "2270700", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270700" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/", "reference_id": "EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/", "reference_id": "H63LGAQXPEVJOES73U4XK65I6DASOAAG", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html", "reference_id": "intel-sa-00898.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8157", "reference_id": "RHSA-2024:8157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8158", "reference_id": "RHSA-2024:8158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8162", "reference_id": "RHSA-2024:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9401", "reference_id": "RHSA-2024:9401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9401" }, { "reference_url": "https://usn.ubuntu.com/6797-1/", "reference_id": "USN-6797-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6797-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-452.html", "reference_id": "XSA-452", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-452.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/", "reference_id": "ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-28746", "XSA-452" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4388?format=api", "vulnerability_id": "VCID-psaa-jdr7-e3fm", "summary": "libxl leaks data to PVH guests via ACPI tables", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45819", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19801", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2249", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22499", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22491", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22703", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45819" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-464.html", "reference_id": "advisory-464.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:56:31Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-464.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-464.html", "reference_id": "XSA-464", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-464.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-45819", "XSA-464" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-psaa-jdr7-e3fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4315?format=api", "vulnerability_id": "VCID-q3p3-tgay-6kcs", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06314", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06417", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06409", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06332", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06343", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06491", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09205", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09232", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-33740" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3p3-tgay-6kcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4410?format=api", "vulnerability_id": "VCID-qpfc-3296-9ub3", "summary": "x86: incomplete IBPB for vCPU isolation", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07141", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07522", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07553", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07526", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0759", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07577", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.075", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07488", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-479.html", "reference_id": "advisory-479.html", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:40:38Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-479.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-479.html", "reference_id": "XSA-479", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-479.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1054735?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-23553", "XSA-479" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfc-3296-9ub3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4412?format=api", "vulnerability_id": "VCID-qsma-2ufh-jybe", "summary": "Xenstored DoS by unprivileged domain", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23555", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03408", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03292", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03357", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03355", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03327", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03306", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04132", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0408", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04099", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-481.html", "reference_id": "advisory-481.html", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-23T14:11:41Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-481.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-481.html", "reference_id": "XSA-481", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-481.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2026-23555", "XSA-481" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qsma-2ufh-jybe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4386?format=api", "vulnerability_id": "VCID-rdub-9bhg-nbc6", "summary": "x86: Deadlock in vlapic_error()", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66056", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66057", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66025", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66039", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-462.html", "reference_id": "advisory-462.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T13:35:45Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-462.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-462.html", "reference_id": "XSA-462", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-462.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-45817", "XSA-462" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdub-9bhg-nbc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4371?format=api", "vulnerability_id": "VCID-rk2f-yqbb-nyd2", "summary": "arm32: The cache may not be properly cleaned/invalidated (take two)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46837", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23587", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23782", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2377", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23749", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23633", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23622", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2374", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2381", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23827", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23771", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46837" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-447.html", "reference_id": "advisory-447.html", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-447.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/", "reference_id": "JFVKWYQFRUU3CAS53THTUKXEOUDWI42G", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/", "reference_id": "XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-447.html", "reference_id": "XSA-447", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-447.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46837", "XSA-447" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rk2f-yqbb-nyd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4378?format=api", "vulnerability_id": "VCID-rt5n-e4wq-p3gh", "summary": "x86 HVM hypercalls may trigger Xen bug check", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84099", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.83982", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84062", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84088", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84094", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.83997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84023", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.8403", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84047", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.8404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84035", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84061", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-454.html", "reference_id": "advisory-454.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T18:23:20Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-454.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-454.html", "reference_id": "XSA-454", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-454.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46842", "XSA-454" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rt5n-e4wq-p3gh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4402?format=api", "vulnerability_id": "VCID-tjgh-waa3-wqgk", "summary": "Arm issues with page refcounting", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18052", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18162", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18215", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.182", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19111", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-473.html", "reference_id": "advisory-473.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:18:50Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-473.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-473.html", "reference_id": "XSA-473", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-473.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58144", "XSA-473" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjgh-waa3-wqgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4408?format=api", "vulnerability_id": "VCID-upju-tcz7-efg1", "summary": "x86: buffer overrun with shadow paging + tracing", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0432", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0434", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04198", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04168", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04177", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-477.html", "reference_id": "advisory-477.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T16:44:38Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-477.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-477.html", "reference_id": "XSA-477", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-477.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1054735?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-58150", "XSA-477" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upju-tcz7-efg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4398?format=api", "vulnerability_id": "VCID-uv8m-bj4c-8fes", "summary": "x86: Transitive Scheduler Attacks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36357", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08597", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09793", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09776", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09633", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10849", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10808", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10748", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035", "reference_id": "1109035", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350726", "reference_id": "2350726", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350726" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html", "reference_id": "amd-sb-7029.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:36:59Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19930", "reference_id": "RHSA-2025:19930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://usn.ubuntu.com/7833-1/", "reference_id": "USN-7833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-1/" }, { "reference_url": "https://usn.ubuntu.com/7833-2/", "reference_id": "USN-7833-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-2/" }, { "reference_url": "https://usn.ubuntu.com/7833-3/", "reference_id": "USN-7833-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-3/" }, { "reference_url": "https://usn.ubuntu.com/7833-4/", "reference_id": "USN-7833-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-4/" }, { "reference_url": "https://usn.ubuntu.com/7834-1/", "reference_id": "USN-7834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7834-1/" }, { "reference_url": "https://usn.ubuntu.com/7848-1/", "reference_id": "USN-7848-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7848-1/" }, { "reference_url": "https://usn.ubuntu.com/7856-1/", "reference_id": "USN-7856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7856-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-471.html", "reference_id": "XSA-471", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-471.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-36357", "XSA-471" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uv8m-bj4c-8fes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4401?format=api", "vulnerability_id": "VCID-vv23-mvyn-87hg", "summary": "Mutiple vulnerabilities in the Viridian interface", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14661", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15748", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15762", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1572", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15702", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16688", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16827", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16641", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-472.html", "reference_id": "advisory-472.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:21:09Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-472.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-472.html", "reference_id": "XSA-472", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-472.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58143" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vv23-mvyn-87hg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4369?format=api", "vulnerability_id": "VCID-wd4s-jxuf-skbp", "summary": "x86/AMD: mismatch in IOMMU quarantine page table levels", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46835", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24807", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24863", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24851", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25134", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25022", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25036", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24996", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24941", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24947", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46835" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928", "reference_id": "1056928", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-445.html", "reference_id": "advisory-445.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-12T04:00:28Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-445.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-445.html", "reference_id": "XSA-445", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-445.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46835", "XSA-445" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wd4s-jxuf-skbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4400?format=api", "vulnerability_id": "VCID-wz1m-aeaf-nkg7", "summary": "Mutiple vulnerabilities in the Viridian interface", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07643", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07611", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08147", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08071", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0811", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08017", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-472.html", "reference_id": "advisory-472.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:24:28Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-472.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-472.html", "reference_id": "XSA-472", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-472.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58142", "XSA-472" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wz1m-aeaf-nkg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4396?format=api", "vulnerability_id": "VCID-xqpz-y83m-4uc4", "summary": "x86: Incorrect stubs exception handling for flags recovery", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27465", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24037", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24143", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25463", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25613", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25598", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-470.html", "reference_id": "advisory-470.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T20:46:06Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-470.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-470.html", "reference_id": "XSA-470", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-470.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-27465", "XSA-470" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqpz-y83m-4uc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4364?format=api", "vulnerability_id": "VCID-ye1t-qhtx-sucm", "summary": "x86/AMD: missing IOMMU TLB flushing", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.2812", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27924", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28368", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28266", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28183", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-442.html", "reference_id": "advisory-442.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T20:27:29Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-442.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-442.html", "reference_id": "XSA-442", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-442.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34326", "XSA-442" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ye1t-qhtx-sucm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4379?format=api", "vulnerability_id": "VCID-z9rm-9p2q-wfag", "summary": "x86: Incorrect logic for BTC/SRSO mitigations", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.8688", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86856", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86872", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86802", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.8683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86843", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86835", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86852", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-455.html", "reference_id": "advisory-455.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T13:51:28Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-455.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-455.html", "reference_id": "XSA-455", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-455.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31142", "XSA-455" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9rm-9p2q-wfag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4317?format=api", "vulnerability_id": "VCID-zkeg-d5d5-vbda", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06317", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06146", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08931", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-33742" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkeg-d5d5-vbda" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4255?format=api", "vulnerability_id": "VCID-1wgc-r96w-7kg9", "summary": "IRQ vector leak on x86", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3308", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18027", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1823", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18381", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18435", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18277", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18279", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18233", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18181", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18138", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18172", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18083", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1806", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3308" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052", "reference_id": "981052", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981052" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-360.html", "reference_id": "XSA-360", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-360.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-3308", "XSA-360" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wgc-r96w-7kg9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4274?format=api", "vulnerability_id": "VCID-1wtd-67ef-1qej", "summary": "IOMMU page mapping issues on x86", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33164", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.3341", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.3355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33466", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.335", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33504", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33439", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.3345", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33263", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33243", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-378.html", "reference_id": "XSA-378", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-378.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28695" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wtd-67ef-1qej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4227?format=api", "vulnerability_id": "VCID-1x3w-n7ms-eqeh", "summary": "oxenstored memory leak in reset_watches", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19303", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19538", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19726", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19529", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19581", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19459", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19351", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19343", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-330.html", "reference_id": "XSA-330", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-330.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29485", "XSA-330" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1x3w-n7ms-eqeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4261?format=api", "vulnerability_id": "VCID-28t2-hng7-tfe5", "summary": "missed flush in XSA-321 backport", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21338", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.215", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2167", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21728", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21481", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21558", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21617", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21629", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21592", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21535", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21533", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2154", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21509", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21363", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2136", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-27379" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-366.html", "reference_id": "XSA-366", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-366.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-27379" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-28t2-hng7-tfe5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4259?format=api", "vulnerability_id": "VCID-2n9p-6t7s-kqc5", "summary": "arm: The cache may not be cleaned for newly allocated scrubbed pages", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26933", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23563", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23764", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23881", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23843", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23752", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2374", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23718", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23598", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27379" }, { "reference_url": "https://security.archlinux.org/AVG-1587", "reference_id": "AVG-1587", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1587" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-364.html", "reference_id": "XSA-364", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-364.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-26933", "XSA-364" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2n9p-6t7s-kqc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4325?format=api", "vulnerability_id": "VCID-2uap-2vm1-efcr", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80604", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80531", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80553", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80558", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80584", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80587", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80498", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80517", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01411", "scoring_system": "epss", "scoring_elements": "0.80545", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226", "reference_id": "2090226", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090226" }, { "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037", "reference_id": "amd-sb-1037", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5207", "reference_id": "dsa-5207", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5207" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/", "reference_id": "MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/" }, { "reference_url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/", "reference_id": "retbleed-intel-and-amd-processor-information-disclosure-vulnerability", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T16:09:18Z/" } ], "url": "https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://usn.ubuntu.com/5564-1/", "reference_id": "USN-5564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5564-1/" }, { "reference_url": "https://usn.ubuntu.com/5565-1/", "reference_id": "USN-5565-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5565-1/" }, { "reference_url": "https://usn.ubuntu.com/5566-1/", "reference_id": "USN-5566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5566-1/" }, { "reference_url": "https://usn.ubuntu.com/5854-1/", "reference_id": "USN-5854-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5854-1/" }, { "reference_url": "https://usn.ubuntu.com/5861-1/", "reference_id": "USN-5861-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5861-1/" }, { "reference_url": "https://usn.ubuntu.com/5862-1/", "reference_id": "USN-5862-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5862-1/" }, { "reference_url": "https://usn.ubuntu.com/5865-1/", "reference_id": "USN-5865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5865-1/" }, { "reference_url": "https://usn.ubuntu.com/5883-1/", "reference_id": "USN-5883-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5883-1/" }, { "reference_url": "https://usn.ubuntu.com/5924-1/", "reference_id": "USN-5924-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5924-1/" }, { "reference_url": "https://usn.ubuntu.com/5975-1/", "reference_id": "USN-5975-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5975-1/" }, { "reference_url": "https://usn.ubuntu.com/6007-1/", "reference_id": "USN-6007-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6007-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-29900" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2uap-2vm1-efcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4267?format=api", "vulnerability_id": "VCID-32w3-vmcb-wfd9", "summary": "xen/arm: Boot modules are not scrubbed", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28693", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18781", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18972", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18778", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18832", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18791", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18738", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18688", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.187", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18719", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18606", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18584", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28693" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-372.html", "reference_id": "XSA-372", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-372.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28693", "XSA-372" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-32w3-vmcb-wfd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4241?format=api", "vulnerability_id": "VCID-34gr-dtsz-1fab", "summary": "x86: Race condition in Xen mapping code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27672.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27672.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27672", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11676", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11842", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11631", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11716", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11771", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11743", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11582", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11664", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11624", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1155", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891096", "reference_id": "1891096", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891096" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-345.html", "reference_id": "XSA-345", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-345.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-27672", "XSA-345" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34gr-dtsz-1fab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4222?format=api", "vulnerability_id": "VCID-34ng-ftbx-e3cm", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24218", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24257", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24397", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36314", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36281", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36297", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T19:52:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42317" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34ng-ftbx-e3cm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4223?format=api", "vulnerability_id": "VCID-39t8-p1q7-eyag", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24218", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24257", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24397", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36314", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36281", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36297", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T16:37:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42318" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39t8-p1q7-eyag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4348?format=api", "vulnerability_id": "VCID-3d53-4qtr-myhm", "summary": "x86 shadow plus log-dirty mode use-after-free", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16081", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.16018", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17918", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18177", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1813", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18081", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18037", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18071", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1798", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17956", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18171", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/03/21/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/03/21/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297", "reference_id": "1033297", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/", "reference_id": "5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L6PM4RE7MUE6OWA32ZVOXCP235RM2TM/" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-427.html", "reference_id": "advisory-427.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-427.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-427.txt", "reference_id": "advisory-427.txt", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-427.txt" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/", "reference_id": "APBMS2Q6746AXAFAITNJMGBNFGNMVLWR", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APBMS2Q6746AXAFAITNJMGBNFGNMVLWR/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5378", "reference_id": "dsa-5378", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-03T15:13:24Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-427.html", "reference_id": "XSA-427", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-427.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42332", "XSA-427" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3d53-4qtr-myhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4214?format=api", "vulnerability_id": "VCID-3pxf-xndw-5fft", "summary": "Xenstore: guests can crash xenstored via watchs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19612", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19798", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20001", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19808", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1986", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1987", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19825", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19768", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19744", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19756", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19652", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19645", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-324.html", "reference_id": "XSA-324", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-324.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29484", "XSA-324" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3pxf-xndw-5fft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4233?format=api", "vulnerability_id": "VCID-3whm-8fyv-zyhd", "summary": "race when migrating timers between x86 HVM vCPU-s", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21783", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.22002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21844", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21911", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21871", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21814", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21823", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21639", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21633", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21623", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877382", "reference_id": "1877382", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877382" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-336.html", "reference_id": "XSA-336", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-336.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25604", "XSA-336" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3whm-8fyv-zyhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4218?format=api", "vulnerability_id": "VCID-416b-93m6-jyby", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36572", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:57:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42313" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-416b-93m6-jyby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4216?format=api", "vulnerability_id": "VCID-42ma-8ash-j7c8", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24218", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24257", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24397", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36253", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36277", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36314", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36286", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36402", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36236", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36281", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36297", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:05:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42311" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42ma-8ash-j7c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4320?format=api", "vulnerability_id": "VCID-4429-qf2w-jqg3", "summary": "x86: MMIO Stale Data vulnerabilities", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40284", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.3992", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40231", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4027", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40298", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40266", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.4019", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40015", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40001", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/06/16/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241", "reference_id": "2090241", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090241" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5173", "reference_id": "dsa-5173", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5173" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5178", "reference_id": "dsa-5178", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5184", "reference_id": "dsa-5184", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5184" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/", "reference_id": "FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html", "reference_id": "intel-sa-00615.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/", "reference_id": "MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220624-0008/", "reference_id": "ntap-20220624-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220624-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5937", "reference_id": "RHSA-2022:5937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5939", "reference_id": "RHSA-2022:5939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6437", "reference_id": "RHSA-2022:6437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6460", "reference_id": "RHSA-2022:6460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/", "reference_id": "RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/", "reference_id": "T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/" }, { "reference_url": "https://usn.ubuntu.com/5484-1/", "reference_id": "USN-5484-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5484-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-1/", "reference_id": "USN-5485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-2/", "reference_id": "USN-5485-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-2/" }, { "reference_url": "https://usn.ubuntu.com/5486-1/", "reference_id": "USN-5486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5486-1/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5535-1/", "reference_id": "USN-5535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "XSA-404", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-404.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-21166", "XSA-404" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4429-qf2w-jqg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4311?format=api", "vulnerability_id": "VCID-4spa-usqt-93b2", "summary": "x86 pv: Race condition in typeref acquisition", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14577", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14751", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14827", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14739", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14702", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1454", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14546", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.1461", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14641", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14638", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-401.html", "reference_id": "XSA-401", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-401.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26362", "XSA-401" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4spa-usqt-93b2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4326?format=api", "vulnerability_id": "VCID-5cw7-rv5f-jfaq", "summary": "insufficient TLB flush for x86 PV guests in shadow mode", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20414", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20742", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20801", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20519", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20596", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20581", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20568", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20561", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20445", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-408.html", "reference_id": "XSA-408", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-408.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-33745", "XSA-408" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5cw7-rv5f-jfaq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4288?format=api", "vulnerability_id": "VCID-5dbd-kz24-6fc1", "summary": "issues with partially successful P2M updates on x86", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24599", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24925", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24813", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24787", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2473", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24745", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24654", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24643", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28709" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-389.html", "reference_id": "XSA-389", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-389.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28709", "XSA-389" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5dbd-kz24-6fc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4243?format=api", "vulnerability_id": "VCID-6kh6-edk7-xkcc", "summary": "unsafe AMD IOMMU page table updates", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27670.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27670.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27670", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13515", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13675", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13555", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13605", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13577", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13539", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13403", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13478", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13449", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13342", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891087", "reference_id": "1891087", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891087" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-347.html", "reference_id": "XSA-347", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-347.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-27670", "XSA-347" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kh6-edk7-xkcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4217?format=api", "vulnerability_id": "VCID-6xbp-t4qh-tbhv", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36572", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:59:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42312", "XSA-326" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xbp-t4qh-tbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4263?format=api", "vulnerability_id": "VCID-77st-3475-5kdr", "summary": "HVM soft-reset crashes toolstack", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28687", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13827", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13979", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14111", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13914", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14052", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1392", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13818", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13889", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13922", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13894", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-368.html", "reference_id": "XSA-368", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-368.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28687", "XSA-368" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-77st-3475-5kdr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4349?format=api", "vulnerability_id": "VCID-7d5b-66n7-zbe1", "summary": "x86/HVM pinned cache attributes mis-handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42333", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61946", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66424", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.6644", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66449", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66464", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66465", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.66396", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0051", "scoring_system": "epss", "scoring_elements": "0.6641", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297", "reference_id": "1033297", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-428.html", "reference_id": "XSA-428", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-428.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42333", "CVE-2022-43334", "XSA-428" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7d5b-66n7-zbe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4342?format=api", "vulnerability_id": "VCID-7ek3-weqx-9fhs", "summary": "x86: Multiple speculative security issues", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23824.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23824", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1248", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12621", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1263", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12597", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14779", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14892", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14913", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14768", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14859", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119127", "reference_id": "2119127", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119127" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-422.html", "reference_id": "XSA-422", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-422.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-23824", "XSA-422" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ek3-weqx-9fhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4307?format=api", "vulnerability_id": "VCID-7etc-u5ya-zued", "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31052", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31457", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31257", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31132", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html", "reference_id": "XSA-400", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-400.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26358" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7etc-u5ya-zued" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4338?format=api", "vulnerability_id": "VCID-7t5h-jy8h-t3d4", "summary": "Xenstore: Cooperating guests can create arbitrary numbers of nodes", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11422", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12097", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12075", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12043", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-419.html", "reference_id": "XSA-419", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-419.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42323" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7t5h-jy8h-t3d4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4312?format=api", "vulnerability_id": "VCID-7wyt-uh2c-a3ha", "summary": "x86 pv: Insufficient care with non-coherent mappings", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24264", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24298", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24084", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2415", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24194", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24213", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24115", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24117", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24093", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23968", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23955", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-402.html", "reference_id": "XSA-402", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-402.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26363" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wyt-uh2c-a3ha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4350?format=api", "vulnerability_id": "VCID-7ysh-usku-c3dz", "summary": "x86/HVM pinned cache attributes mis-handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42334", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.1505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15179", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18468", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1849", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1839", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18373", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18333", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18561", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18613", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297", "reference_id": "1033297", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-428.html", "reference_id": "XSA-428", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-428.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42334" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ysh-usku-c3dz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4221?format=api", "vulnerability_id": "VCID-7zpj-3par-s3b5", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36572", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36525", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42316" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zpj-3par-s3b5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4219?format=api", "vulnerability_id": "VCID-87tq-2me2-d3bb", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36572", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:50:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42314" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-87tq-2me2-d3bb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4332?format=api", "vulnerability_id": "VCID-8cb8-vq2c-q3e9", "summary": "Xenstore: Guests can crash xenstored", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16825", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16686", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18818", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18965", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19543", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19701", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19594", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1958", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-414.html", "reference_id": "XSA-414", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-414.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42309", "XSA-414" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cb8-vq2c-q3e9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4249?format=api", "vulnerability_id": "VCID-8r8y-8bq2-jufj", "summary": "oxenstored: permissions not checked on root node", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14314", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14399", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14464", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.1427", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14353", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14408", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14358", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14262", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14153", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14151", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14224", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14252", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14228", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14161", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-353.html", "reference_id": "XSA-353", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-353.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29479", "XSA-353" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8r8y-8bq2-jufj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4329?format=api", "vulnerability_id": "VCID-91hk-73kq-83g6", "summary": "lock order inversion in transitive grant copy handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1153", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11778", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11821", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11693", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11748", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11761", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11723", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11563", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11686", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11646", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11606", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668", "reference_id": "1021668", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-411.html", "reference_id": "XSA-411", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-411.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-33748", "XSA-411" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-91hk-73kq-83g6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4254?format=api", "vulnerability_id": "VCID-9hr5-p18q-7qb8", "summary": "FIFO event channels control structure ordering", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18121", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18342", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18339", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18391", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18343", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18291", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18235", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18247", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18275", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18173", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18157", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-359.html", "reference_id": "XSA-359", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-359.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29571", "XSA-359" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9hr5-p18q-7qb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4283?format=api", "vulnerability_id": "VCID-9s43-gewn-bycc", "summary": "grant table v2 status pages may remain accessible after de-allocation (take two)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28703", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2896", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29363", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2948", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29292", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29398", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29304", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29329", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29259", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29143", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29032", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-387.html", "reference_id": "XSA-387", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-387.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28703", "XSA-387" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9s43-gewn-bycc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4295?format=api", "vulnerability_id": "VCID-9zqd-3x84-43gc", "summary": "arm: guest_physmap_remove_page not removing the p2m mappings", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23033.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23033.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26003", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25817", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25938", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25948", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25906", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25852", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25856", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25838", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25751", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25743", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25696", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045043", "reference_id": "2045043", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045043" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-393.html", "reference_id": "XSA-393", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-393.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-23033", "XSA-393" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9zqd-3x84-43gc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4280?format=api", "vulnerability_id": "VCID-az8d-xrb4-3ug4", "summary": "Another race in XENMAPSPACE_grant_table handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18443", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18682", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18819", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18872", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18729", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18684", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18634", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18586", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18607", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.185", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18486", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28701" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-384.html", "reference_id": "XSA-384", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-384.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28701", "XSA-384" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-az8d-xrb4-3ug4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4310?format=api", "vulnerability_id": "VCID-b7tb-ns1t-fyaw", "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31052", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31457", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31257", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31132", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html", "reference_id": "XSA-400", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-400.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26361" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7tb-ns1t-fyaw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4215?format=api", "vulnerability_id": "VCID-bc6f-wu8g-5yb4", "summary": "Xenstore: guests can disturb domain cleanup", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17323", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17518", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17681", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17727", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17447", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17538", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17597", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17615", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17516", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1746", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17469", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17505", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17414", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17391", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-325.html", "reference_id": "XSA-325", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-325.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29483", "XSA-325" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bc6f-wu8g-5yb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4236?format=api", "vulnerability_id": "VCID-bs56-1z79-uqbt", "summary": "x86 pv guest kernel DoS via SYSENTER", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24863", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24941", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24823", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24867", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24881", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24843", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24787", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24791", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24768", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24707", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24696", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24653", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880137", "reference_id": "1880137", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880137" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-339.html", "reference_id": "XSA-339", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-339.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25596", "XSA-339" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bs56-1z79-uqbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4286?format=api", "vulnerability_id": "VCID-bxae-85uh-uyek", "summary": "PoD operations on misaligned GFNs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24723", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24867", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2486", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24838", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24781", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2477", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24929", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.25008", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.25047", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24888", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24934", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24949", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24909", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24855", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-388.txt", "reference_id": "advisory-388.txt", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-388.txt" }, { "reference_url": "https://www.debian.org/security/2021/dsa-5017", "reference_id": "dsa-5017", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/" } ], "url": "https://www.debian.org/security/2021/dsa-5017" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/", "reference_id": "I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7ZGWVVRI4XY2XSTBI3XEMWBXPDVX6OT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/", "reference_id": "PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-18T20:21:02Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PXUI4VMD52CH3T7YXAG3J2JW7ZNN3SXF/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-388.html", "reference_id": "XSA-388", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-388.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28708" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bxae-85uh-uyek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4220?format=api", "vulnerability_id": "VCID-bxb7-7gpw-qybb", "summary": "Xenstore: guests can let run xenstored out of memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24557", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.2457", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24626", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36688", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36572", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "advisory-326.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-326.txt", "reference_id": "advisory-326.txt", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-326.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-326.html", "reference_id": "XSA-326", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-326.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T14:49:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42315" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bxb7-7gpw-qybb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4230?format=api", "vulnerability_id": "VCID-bzve-5gwu-8ydb", "summary": "x86 pv: Crash when handling guest access to MSR_MISC_ENABLE", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25602.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23866", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23986", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23877", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23923", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2394", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23841", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23853", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23822", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23704", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23693", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23657", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880158", "reference_id": "1880158", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880158" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-333.html", "reference_id": "XSA-333", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-333.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25602", "XSA-333" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bzve-5gwu-8ydb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4318?format=api", "vulnerability_id": "VCID-csy7-esn4-u3gq", "summary": "x86: MMIO Stale Data vulnerabilities", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21123.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63769", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63755", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63739", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63741", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63754", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6374", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63723", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63711", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64395", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/06/16/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237", "reference_id": "2090237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090237" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5173", "reference_id": "dsa-5173", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5173" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5178", "reference_id": "dsa-5178", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5184", "reference_id": "dsa-5184", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5184" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/", "reference_id": "FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html", "reference_id": "intel-sa-00615.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/", "reference_id": "MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220624-0008/", "reference_id": "ntap-20220624-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220624-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5937", "reference_id": "RHSA-2022:5937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5939", "reference_id": "RHSA-2022:5939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6437", "reference_id": "RHSA-2022:6437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6460", "reference_id": "RHSA-2022:6460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/", "reference_id": "RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/", "reference_id": "T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:43Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/" }, { "reference_url": "https://usn.ubuntu.com/5484-1/", "reference_id": "USN-5484-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5484-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-1/", "reference_id": "USN-5485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-2/", "reference_id": "USN-5485-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-2/" }, { "reference_url": "https://usn.ubuntu.com/5486-1/", "reference_id": "USN-5486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5486-1/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5535-1/", "reference_id": "USN-5535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "XSA-404", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-404.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-21123" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-csy7-esn4-u3gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4248?format=api", "vulnerability_id": "VCID-d3ad-6tme-bfem", "summary": "oxenstored: node ownership can be changed by unprivileged clients", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18989", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19026", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18889", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18901", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18913", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18804", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18783", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18738", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-352.html", "reference_id": "XSA-352", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-352.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29486", "XSA-352" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3ad-6tme-bfem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4339?format=api", "vulnerability_id": "VCID-dfjm-gwzm-jqbt", "summary": "Oxenstored 32->31 bit integer truncation issues", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.1015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10047", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11591", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11713", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11671", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11632", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11556", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11751", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11726", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11589", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-420.html", "reference_id": "XSA-420", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-420.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42324", "XSA-420" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dfjm-gwzm-jqbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4335?format=api", "vulnerability_id": "VCID-dgm4-ye4m-1fcq", "summary": "Xenstore: Guests can get access to Xenstore nodes of deleted domains", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12428", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12384", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12308", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12229", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14067", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13898", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.13907", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14753", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14774", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1481", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14809", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/01/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/7" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-417.html", "reference_id": "advisory-417.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-417.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-417.txt", "reference_id": "advisory-417.txt", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-417.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-417.html", "reference_id": "XSA-417", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-417.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T14:37:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42320", "XSA-417" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgm4-ye4m-1fcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4305?format=api", "vulnerability_id": "VCID-dj1v-h79p-9ydz", "summary": "Racy interactions between dirty vram tracking and paging log dirty hypercalls", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14927", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15172", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15065", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15116", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15084", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14985", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14882", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14889", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14982", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-397.html", "reference_id": "XSA-397", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-397.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26356", "XSA-397" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dj1v-h79p-9ydz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4240?format=api", "vulnerability_id": "VCID-dqy9-zkvw-e3gk", "summary": "lack of preemption in evtchn_reset() / evtchn_destroy()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25601.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22683", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22902", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22695", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22823", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22845", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22808", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22751", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22761", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2272", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22557", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22549", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22547", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877378", "reference_id": "1877378", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877378" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-344.html", "reference_id": "XSA-344", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-344.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25601", "XSA-344" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dqy9-zkvw-e3gk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4212?format=api", "vulnerability_id": "VCID-drhd-ytb7-u3em", "summary": "Xenstore: new domains inheriting existing node permissions", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20281", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20465", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20667", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20394", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20475", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20534", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20558", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20513", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20458", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20446", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20321", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20315", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-322.html", "reference_id": "XSA-322", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-322.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29481", "XSA-322" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drhd-ytb7-u3em" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4271?format=api", "vulnerability_id": "VCID-e96u-uwba-kfg5", "summary": "Speculative Code Store Bypass", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26313", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23106", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23281", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23324", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23186", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23259", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23163", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.2318", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23172", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23133", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22958", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22952", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22948", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-375.html", "reference_id": "XSA-375", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-375.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-26313" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e96u-uwba-kfg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4235?format=api", "vulnerability_id": "VCID-eb8v-p31a-yuhu", "summary": "once valid event channels may not turn invalid", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25597.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25597.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29184", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2926", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2931", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29187", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29134", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.2916", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29137", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29088", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28968", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28856", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28785", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879553", "reference_id": "1879553", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879553" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-338.html", "reference_id": "XSA-338", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-338.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25597", "XSA-338" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eb8v-p31a-yuhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4242?format=api", "vulnerability_id": "VCID-eka3-u8e5-3uad", "summary": "undue deferral of IOMMU TLB flushes", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27671.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27671.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21789", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21954", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.22007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21916", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21876", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21791", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21643", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21638", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21627", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891091", "reference_id": "1891091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891091" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-346.html", "reference_id": "XSA-346", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-346.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-27671", "XSA-346" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eka3-u8e5-3uad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4234?format=api", "vulnerability_id": "VCID-ep7n-um5m-ekgk", "summary": "PCI passthrough code reading back hardware registers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25595.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25595.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25165", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25245", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25284", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25056", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25171", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25141", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25089", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.251", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25091", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25062", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25002", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.24947", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877369", "reference_id": "1877369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877369" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-337.html", "reference_id": "XSA-337", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-337.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25595", "XSA-337" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ep7n-um5m-ekgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4284?format=api", "vulnerability_id": "VCID-fekb-fbhz-y7g7", "summary": "PoD operations on misaligned GFNs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24599", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24925", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24813", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24787", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2473", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24745", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24654", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24643", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-388.html", "reference_id": "XSA-388", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-388.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28704", "XSA-388" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fekb-fbhz-y7g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4327?format=api", "vulnerability_id": "VCID-fhbs-3nvf-tbha", "summary": "Arm: unbounded memory consumption for 2nd-level page tables", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08391", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08312", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08392", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08365", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08242", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08227", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0836", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08325", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08291", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668", "reference_id": "1021668", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-409.html", "reference_id": "XSA-409", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-409.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-33747", "XSA-409" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fhbs-3nvf-tbha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4282?format=api", "vulnerability_id": "VCID-fqt9-2esb-ffan", "summary": "PCI devices with RMRRs not deassigned correctly", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16571", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16789", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.1673", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16666", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16674", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16711", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16617", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16606", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16834", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22371", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22541", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22374", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22508", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-386.html", "reference_id": "XSA-386", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-386.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28702", "XSA-386" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fqt9-2esb-ffan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4279?format=api", "vulnerability_id": "VCID-g72t-7kx1-abcs", "summary": "xen/arm: No memory limit for dom0less domUs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84224", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.8409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84121", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84122", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84145", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84151", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84163", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84158", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84181", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84182", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84211", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02126", "scoring_system": "epss", "scoring_elements": "0.84219", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-383.html", "reference_id": "XSA-383", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-383.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28700", "XSA-383" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g72t-7kx1-abcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4287?format=api", "vulnerability_id": "VCID-gdsj-4cbx-ufep", "summary": "issues with partially successful P2M updates on x86", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29762", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30158", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30243", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30063", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30122", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30119", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30082", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3006", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30014", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29944", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29828", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-389.html", "reference_id": "XSA-389", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-389.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28705" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gdsj-4cbx-ufep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4333?format=api", "vulnerability_id": "VCID-gj1u-mbaj-kyc5", "summary": "Xenstore: Guests can create orphaned Xenstore nodes", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06008", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06028", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06067", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07124", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07114", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07103", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07023", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07487", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07566", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07528", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07518", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-415.html", "reference_id": "XSA-415", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-415.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42310", "XSA-415" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gj1u-mbaj-kyc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4252?format=api", "vulnerability_id": "VCID-h9c6-yw5r-v3ex", "summary": "infinite loop when cleaning up IRQ vectors", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17018", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17373", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17152", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17301", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17265", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17145", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17151", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17074", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29567" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-356.html", "reference_id": "XSA-356", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-356.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29567", "XSA-356" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9c6-yw5r-v3ex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4313?format=api", "vulnerability_id": "VCID-hg4z-ad3f-fbc2", "summary": "x86 pv: Insufficient care with non-coherent mappings", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28752", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29219", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29272", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29125", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29101", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.29054", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28936", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00108", "scoring_system": "epss", "scoring_elements": "0.28823", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-402.html", "reference_id": "XSA-402", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-402.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26364", "XSA-402" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hg4z-ad3f-fbc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4334?format=api", "vulnerability_id": "VCID-hsau-swt9-kyf7", "summary": "Xenstore: Guests can cause Xenstore to not free temporary memory", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06679", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.06759", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07834", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07948", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07931", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07818", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08324", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08423", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08393", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08359", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-416.html", "reference_id": "XSA-416", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-416.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42319", "XSA-416" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hsau-swt9-kyf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4308?format=api", "vulnerability_id": "VCID-hx7j-eymk-4ygk", "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31052", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31457", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31257", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31132", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html", "reference_id": "XSA-400", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-400.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26359" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7j-eymk-4ygk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4272?format=api", "vulnerability_id": "VCID-hyup-47wa-pfac", "summary": "x86: TSX Async Abort protections not restored after S3", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28690", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57967", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57887", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.5799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58022", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58024", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58028", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.58005", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57968", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00357", "scoring_system": "epss", "scoring_elements": "0.57984", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-377.html", "reference_id": "XSA-377", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-377.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28690", "XSA-377" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hyup-47wa-pfac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4306?format=api", "vulnerability_id": "VCID-jwdv-qe4x-yfgw", "summary": "race in VT-d domain ID cleanup", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05213", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05039", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05061", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05109", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05083", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05049", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04997", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05143", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0517", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05211", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-399.html", "reference_id": "XSA-399", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-399.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26357", "XSA-399" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwdv-qe4x-yfgw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4244?format=api", "vulnerability_id": "VCID-k5j4-3xmv-a7bk", "summary": "undue recursion in x86 HVM context switch code", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21428", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21589", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21761", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21702", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21713", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21674", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21616", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21624", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21593", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21446", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2144", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-348.html", "reference_id": "XSA-348", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-348.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29566", "XSA-348" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k5j4-3xmv-a7bk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4275?format=api", "vulnerability_id": "VCID-kcj6-ua4t-ybgj", "summary": "IOMMU page mapping issues on x86", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25731", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25974", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.26099", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25866", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25998", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25954", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25894", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25897", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25879", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25848", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25785", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25777", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-378.html", "reference_id": "XSA-378", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-378.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28696" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kcj6-ua4t-ybgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4270?format=api", "vulnerability_id": "VCID-knqd-zktw-cydm", "summary": "Speculative Code Store Bypass", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-0089", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1765", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1783", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17746", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17834", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17896", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17912", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1776", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1777", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17808", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17717", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17694", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-0089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-375.html", "reference_id": "XSA-375", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-375.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-0089", "XSA-375" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-knqd-zktw-cydm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4351?format=api", "vulnerability_id": "VCID-mcs2-ndqd-tydv", "summary": "x86: speculative vulnerability in 32bit SYSCALL path", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42331", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14308", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14247", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17471", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17413", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17423", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17458", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17371", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17348", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17281", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17497", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17557", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23824" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42331" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42333" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42334" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297", "reference_id": "1033297", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033297" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-429.html", "reference_id": "XSA-429", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-429.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42331", "XSA-429" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mcs2-ndqd-tydv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4276?format=api", "vulnerability_id": "VCID-mf8g-nbkw-f7gr", "summary": "grant table v2 status pages may remain accessible after de-allocation", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18233", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18458", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18603", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18502", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18503", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18455", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18404", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18348", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1836", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18386", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18286", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18272", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-379.html", "reference_id": "XSA-379", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-379.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28697", "XSA-379" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mf8g-nbkw-f7gr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4251?format=api", "vulnerability_id": "VCID-n3t2-m6br-ufb3", "summary": "stack corruption from XSA-346 change", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29040.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20135", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20282", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.2034", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20064", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20145", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20202", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20227", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20182", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20117", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20121", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20004", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19969", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29040" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902766", "reference_id": "1902766", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902766" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976109", "reference_id": "976109", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976109" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-355.html", "reference_id": "XSA-355", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-355.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29040", "XSA-355" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n3t2-m6br-ufb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4268?format=api", "vulnerability_id": "VCID-n7pg-b7kc-wkew", "summary": "inappropriate x86 IOMMU timeout detection / handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28692", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10522", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10461", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10666", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1053", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10603", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10662", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10675", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10643", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10619", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10484", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10502", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10627", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10576", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10575", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28692" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-373.html", "reference_id": "XSA-373", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-373.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28692", "XSA-373" ], "risk_score": 1.1, "exploitability": "0.5", "weighted_severity": "2.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7pg-b7kc-wkew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4253?format=api", "vulnerability_id": "VCID-ndz3-372h-8fhk", "summary": "FIFO event channels control block related ordering", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18506", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1888", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18656", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18789", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18697", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18646", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18657", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18568", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18546", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202107-30", "reference_id": "GLSA-202107-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-30" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-358.html", "reference_id": "XSA-358", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-358.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29570", "XSA-358" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ndz3-372h-8fhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3999?format=api", "vulnerability_id": "VCID-p3uc-18e9-skb4", "summary": "xenstore watch notifications lacking permission checks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19381", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19432", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19229", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19239", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19145", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19164", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19055", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19044", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-115.html", "reference_id": "XSA-115", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-115.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29480", "XSA-115" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p3uc-18e9-skb4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4238?format=api", "vulnerability_id": "VCID-p7ug-wwk5-63gb", "summary": "out of bounds event channels available to 32-bit x86 domains", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27816", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27866", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27906", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27766", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27814", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27723", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27697", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27658", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27605", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27498", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27426", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880156", "reference_id": "1880156", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880156" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-342.html", "reference_id": "XSA-342", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-342.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25600", "XSA-342" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p7ug-wwk5-63gb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4328?format=api", "vulnerability_id": "VCID-pb8n-hmsc-syfw", "summary": "P2M pool freeing may take excessively long", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11615", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11867", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11835", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11845", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11806", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11779", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11643", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11764", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11732", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11693", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668", "reference_id": "1021668", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021668" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-410.html", "reference_id": "XSA-410", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-410.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-33746", "XSA-410" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pb8n-hmsc-syfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4337?format=api", "vulnerability_id": "VCID-pphm-ygb7-q7g2", "summary": "Xenstore: Cooperating guests can create arbitrary numbers of nodes", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11422", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12097", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12075", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12043", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-419.html", "reference_id": "XSA-419", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-419.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42322", "XSA-419" ], "risk_score": 1.3, "exploitability": "0.5", "weighted_severity": "2.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pphm-ygb7-q7g2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4172?format=api", "vulnerability_id": "VCID-pzt3-abab-4kdd", "summary": "x86 PV guest INVLPG-like flushes may leave stale TLB entries", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27674.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27674.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22151", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22309", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22137", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2222", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22274", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22294", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22252", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22193", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22194", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22188", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22142", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22002", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21988", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21975", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891089", "reference_id": "1891089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891089" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-286.html", "reference_id": "XSA-286", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-286.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-27674", "XSA-286" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzt3-abab-4kdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4336?format=api", "vulnerability_id": "VCID-qnew-xqte-kbej", "summary": "Xenstore: Guests can crash xenstored via exhausting the stack", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08398", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08383", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09504", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09661", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09629", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09613", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09509", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10173", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10261", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10241", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10228", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-418.html", "reference_id": "XSA-418", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-418.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42321", "XSA-418" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qnew-xqte-kbej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4273?format=api", "vulnerability_id": "VCID-qprv-989b-k3d3", "summary": "IOMMU page mapping issues on x86", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33137", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.3338", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33549", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.3339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33435", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33472", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33407", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33419", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33388", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33234", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33217", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-378.html", "reference_id": "XSA-378", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-378.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28694", "XSA-378" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qprv-989b-k3d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4278?format=api", "vulnerability_id": "VCID-s4nf-p69f-pue8", "summary": "inadequate grant-v2 status frames array bounds check", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22244", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22396", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22563", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22475", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22529", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22507", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22465", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22415", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22263", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22249", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-382.html", "reference_id": "XSA-382", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-382.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28699", "XSA-382" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s4nf-p69f-pue8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4319?format=api", "vulnerability_id": "VCID-td6e-x2qb-syg3", "summary": "x86: MMIO Stale Data vulnerabilities", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21125.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47466", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00242", "scoring_system": "epss", "scoring_elements": "0.47421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67511", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.6752", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67518", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67507", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67488", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00536", "scoring_system": "epss", "scoring_elements": "0.67499", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21127" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/06/16/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/06/16/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240", "reference_id": "2090240", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090240" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "advisory-404.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-404.html" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5173", "reference_id": "dsa-5173", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5173" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5178", "reference_id": "dsa-5178", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5178" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5184", "reference_id": "dsa-5184", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5184" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/", "reference_id": "FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FHTEW3RXU2GW6S3RCPQG4VNCZGI3TOSV/" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html", "reference_id": "intel-sa-00615.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/", "reference_id": "MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MCVOMHBQRH4KP7IN6U24CW7F2D2L5KBS/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220624-0008/", "reference_id": "ntap-20220624-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220624-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5937", "reference_id": "RHSA-2022:5937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5939", "reference_id": "RHSA-2022:5939", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5939" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6437", "reference_id": "RHSA-2022:6437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6460", "reference_id": "RHSA-2022:6460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6872", "reference_id": "RHSA-2022:6872", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6872" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6983", "reference_id": "RHSA-2022:6983", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6983" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6991", "reference_id": "RHSA-2022:6991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7279", "reference_id": "RHSA-2022:7279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7280", "reference_id": "RHSA-2022:7280", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7280" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/", "reference_id": "RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/", "reference_id": "T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:20:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4P2KJYL74KGLHE4JZETVW7PZH6ZIABA/" }, { "reference_url": "https://usn.ubuntu.com/5484-1/", "reference_id": "USN-5484-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5484-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-1/", "reference_id": "USN-5485-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-1/" }, { "reference_url": "https://usn.ubuntu.com/5485-2/", "reference_id": "USN-5485-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5485-2/" }, { "reference_url": "https://usn.ubuntu.com/5505-1/", "reference_id": "USN-5505-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5505-1/" }, { "reference_url": "https://usn.ubuntu.com/5513-1/", "reference_id": "USN-5513-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5513-1/" }, { "reference_url": "https://usn.ubuntu.com/5529-1/", "reference_id": "USN-5529-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5529-1/" }, { "reference_url": "https://usn.ubuntu.com/5535-1/", "reference_id": "USN-5535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-404.html", "reference_id": "XSA-404", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-404.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-21125" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-td6e-x2qb-syg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4277?format=api", "vulnerability_id": "VCID-uunr-69dt-q7fn", "summary": "long running loops in grant table handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17302", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.175", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17663", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17709", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17522", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17596", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17497", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.1744", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17449", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17392", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17369", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-380.html", "reference_id": "XSA-380", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-380.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28698", "XSA-380" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uunr-69dt-q7fn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4213?format=api", "vulnerability_id": "VCID-uvcp-ad38-2kcs", "summary": "Xenstore: wrong path length check", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19777", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20099", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19886", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.20038", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19936", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19919", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19923", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.1992", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19812", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19807", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-323.html", "reference_id": "XSA-323", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-323.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-29482", "XSA-323" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvcp-ad38-2kcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4237?format=api", "vulnerability_id": "VCID-vb2u-yc2z-ayh5", "summary": "Missing memory barriers when accessing/allocating an event channel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25603.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21923", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22085", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22135", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21911", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21992", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22062", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22021", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.2196", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21956", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21913", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21767", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21755", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21747", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877366", "reference_id": "1877366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877366" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-340.html", "reference_id": "XSA-340", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-340.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25603", "XSA-340" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vb2u-yc2z-ayh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4296?format=api", "vulnerability_id": "VCID-vs9k-akwv-h3ak", "summary": "A PV guest could DoS Xen while unmapping a grant", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23034.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23034.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28649", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28691", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.286", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28619", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28545", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28429", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28317", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28241", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045041", "reference_id": "2045041", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045041" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-394.html", "reference_id": "XSA-394", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-394.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-23034", "XSA-394" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vs9k-akwv-h3ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4297?format=api", "vulnerability_id": "VCID-w2ch-guy5-6ye9", "summary": "Insufficient cleanup of passed-through device IRQs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23035.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23035.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30304", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3018", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30175", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30128", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30143", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30079", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30009", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29894", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.29824", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045039", "reference_id": "2045039", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045039" }, { "reference_url": "https://security.gentoo.org/glsa/202208-23", "reference_id": "GLSA-202208-23", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202208-23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-395.html", "reference_id": "XSA-395", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-395.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-23035", "XSA-395" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ch-guy5-6ye9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4340?format=api", "vulnerability_id": "VCID-wh75-sc4f-qqc1", "summary": "Xenstore: Guests can create arbitrary number of nodes via transactions", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09776", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09681", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11254", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11455", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11422", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11255", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12097", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12075", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12043", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-421.html", "reference_id": "XSA-421", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-421.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42325", "XSA-421" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wh75-sc4f-qqc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4285?format=api", "vulnerability_id": "VCID-xcvw-eex8-j3bf", "summary": "PoD operations on misaligned GFNs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24599", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24925", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.247", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24813", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24827", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24787", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.2473", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24745", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24737", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24714", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24654", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24643", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-388.html", "reference_id": "XSA-388", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-388.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28707" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xcvw-eex8-j3bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4239?format=api", "vulnerability_id": "VCID-xe4j-gg7f-wyfa", "summary": "races with evtchn_reset()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25599.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25599.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22465", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2251", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22381", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22457", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22416", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.2236", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22379", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22375", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22323", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22174", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22161", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22154", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879567", "reference_id": "1879567", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879567" }, { "reference_url": "https://security.gentoo.org/glsa/202011-06", "reference_id": "GLSA-202011-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202011-06" }, { "reference_url": "https://usn.ubuntu.com/5617-1/", "reference_id": "USN-5617-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5617-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-343.html", "reference_id": "XSA-343", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-343.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-25599", "XSA-343" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xe4j-gg7f-wyfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4341?format=api", "vulnerability_id": "VCID-z3g4-1vhq-97dj", "summary": "Xenstore: Guests can create arbitrary number of nodes via transactions", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09618", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11071", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11062", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11198", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11224", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11792", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11663", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11824", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42310" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42315" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42316" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42317" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42324" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/11/01/11", "reference_id": "11", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/11/01/11" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-421.html", "reference_id": "advisory-421.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-421.html" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-421.txt", "reference_id": "advisory-421.txt", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-421.txt" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5272", "reference_id": "dsa-5272", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5272" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-421.html", "reference_id": "XSA-421", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-421.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/", "reference_id": "YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/", "reference_id": "YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZVXG7OOOXCX6VIPEMLFDPIPUTFAYWPE/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/", "reference_id": "ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-05T15:05:04Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZLI2NPNEH7CNJO3VZGQNOI4M4EWLNKPZ/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-42326" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3g4-1vhq-97dj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4281?format=api", "vulnerability_id": "VCID-z3qj-cnxq-pkgq", "summary": "guests may exceed their designated memory limit", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35862", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.3616", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36222", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36271", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36294", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36238", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36266", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36214", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35982", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.35949", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-385.html", "reference_id": "XSA-385", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-385.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2021-28706", "XSA-385" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3qj-cnxq-pkgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4309?format=api", "vulnerability_id": "VCID-z8zf-cqkb-guge", "summary": "IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31052", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.3149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31519", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31523", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31481", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31444", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31457", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31257", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00123", "scoring_system": "epss", "scoring_elements": "0.31132", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-400.html", "reference_id": "XSA-400", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-400.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-26360", "XSA-400" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z8zf-cqkb-guge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4324?format=api", "vulnerability_id": "VCID-zkyv-h5at-xkgq", "summary": "Retbleed - arbitrary speculative code execution with return instructions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.3369", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33561", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33605", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33638", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33633", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33602", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33578", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33387", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33368", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00138", "scoring_system": "epss", "scoring_elements": "0.33286", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26362" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26364" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153", "reference_id": "2103153", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103153" }, { "reference_url": "https://security.gentoo.org/glsa/202402-07", "reference_id": "GLSA-202402-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7110", "reference_id": "RHSA-2022:7110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7134", "reference_id": "RHSA-2022:7134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7337", "reference_id": "RHSA-2022:7337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7338", "reference_id": "RHSA-2022:7338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7933", "reference_id": "RHSA-2022:7933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8267", "reference_id": "RHSA-2022:8267", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8973", "reference_id": "RHSA-2022:8973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8974", "reference_id": "RHSA-2022:8974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8974" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-407.html", "reference_id": "XSA-407", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-407.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2022-23825", "XSA-407" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkyv-h5at-xkgq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4247?format=api", "vulnerability_id": "VCID-zrxf-3w1d-t3ba", "summary": "Information leak via power sidechannel", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20512", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20648", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20668", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20626", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20574", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20556", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20436", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20435", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20404", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-28368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897145", "reference_id": "1897145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1897145" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-351.html", "reference_id": "XSA-351", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-351.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037808?format=api", "purl": "pkg:deb/debian/xen@4.11.4%2B107-gef32c7afa2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1wgc-r96w-7kg9" }, { "vulnerability": "VCID-1wtd-67ef-1qej" }, { "vulnerability": "VCID-1x3w-n7ms-eqeh" }, { "vulnerability": "VCID-28t2-hng7-tfe5" }, { "vulnerability": "VCID-2n9p-6t7s-kqc5" }, { "vulnerability": "VCID-2uap-2vm1-efcr" }, { "vulnerability": "VCID-32w3-vmcb-wfd9" }, { "vulnerability": "VCID-34gr-dtsz-1fab" }, { "vulnerability": "VCID-34ng-ftbx-e3cm" }, { "vulnerability": "VCID-39t8-p1q7-eyag" }, { "vulnerability": "VCID-3d53-4qtr-myhm" }, { "vulnerability": "VCID-3pxf-xndw-5fft" }, { "vulnerability": "VCID-3whm-8fyv-zyhd" }, { "vulnerability": "VCID-416b-93m6-jyby" }, { "vulnerability": "VCID-42ma-8ash-j7c8" }, { "vulnerability": "VCID-4429-qf2w-jqg3" }, { "vulnerability": "VCID-4spa-usqt-93b2" }, { "vulnerability": "VCID-5cw7-rv5f-jfaq" }, { "vulnerability": "VCID-5dbd-kz24-6fc1" }, { "vulnerability": "VCID-6kh6-edk7-xkcc" }, { "vulnerability": "VCID-6xbp-t4qh-tbhv" }, { "vulnerability": "VCID-77st-3475-5kdr" }, { "vulnerability": "VCID-7d5b-66n7-zbe1" }, { "vulnerability": "VCID-7ek3-weqx-9fhs" }, { "vulnerability": "VCID-7etc-u5ya-zued" }, { "vulnerability": "VCID-7t5h-jy8h-t3d4" }, { "vulnerability": "VCID-7wyt-uh2c-a3ha" }, { "vulnerability": "VCID-7ysh-usku-c3dz" }, { "vulnerability": "VCID-7zpj-3par-s3b5" }, { "vulnerability": "VCID-87tq-2me2-d3bb" }, { "vulnerability": "VCID-8cb8-vq2c-q3e9" }, { "vulnerability": "VCID-8r8y-8bq2-jufj" }, { "vulnerability": "VCID-91hk-73kq-83g6" }, { "vulnerability": "VCID-9hr5-p18q-7qb8" }, { "vulnerability": "VCID-9s43-gewn-bycc" }, { "vulnerability": "VCID-9zqd-3x84-43gc" }, { "vulnerability": "VCID-az8d-xrb4-3ug4" }, { "vulnerability": "VCID-b7tb-ns1t-fyaw" }, { "vulnerability": "VCID-bc6f-wu8g-5yb4" }, { "vulnerability": "VCID-bs56-1z79-uqbt" }, { "vulnerability": "VCID-bxae-85uh-uyek" }, { "vulnerability": "VCID-bxb7-7gpw-qybb" }, { "vulnerability": "VCID-bzve-5gwu-8ydb" }, { "vulnerability": "VCID-csy7-esn4-u3gq" }, { "vulnerability": "VCID-d3ad-6tme-bfem" }, { "vulnerability": "VCID-dfjm-gwzm-jqbt" }, { "vulnerability": "VCID-dgm4-ye4m-1fcq" }, { "vulnerability": "VCID-dj1v-h79p-9ydz" }, { "vulnerability": "VCID-dqy9-zkvw-e3gk" }, { "vulnerability": "VCID-drhd-ytb7-u3em" }, { "vulnerability": "VCID-e96u-uwba-kfg5" }, { "vulnerability": "VCID-eb8v-p31a-yuhu" }, { "vulnerability": "VCID-eka3-u8e5-3uad" }, { "vulnerability": "VCID-ep7n-um5m-ekgk" }, { "vulnerability": "VCID-fekb-fbhz-y7g7" }, { "vulnerability": "VCID-fhbs-3nvf-tbha" }, { "vulnerability": "VCID-fqt9-2esb-ffan" }, { "vulnerability": "VCID-g72t-7kx1-abcs" }, { "vulnerability": "VCID-gdsj-4cbx-ufep" }, { "vulnerability": "VCID-gj1u-mbaj-kyc5" }, { "vulnerability": "VCID-h9c6-yw5r-v3ex" }, { "vulnerability": "VCID-hg4z-ad3f-fbc2" }, { "vulnerability": "VCID-hsau-swt9-kyf7" }, { "vulnerability": "VCID-hx7j-eymk-4ygk" }, { "vulnerability": "VCID-hyup-47wa-pfac" }, { "vulnerability": "VCID-jwdv-qe4x-yfgw" }, { "vulnerability": "VCID-k5j4-3xmv-a7bk" }, { "vulnerability": "VCID-kcj6-ua4t-ybgj" }, { "vulnerability": "VCID-knqd-zktw-cydm" }, { "vulnerability": "VCID-mcs2-ndqd-tydv" }, { "vulnerability": "VCID-mf8g-nbkw-f7gr" }, { "vulnerability": "VCID-n3t2-m6br-ufb3" }, { "vulnerability": "VCID-n7pg-b7kc-wkew" }, { "vulnerability": "VCID-ndz3-372h-8fhk" }, { "vulnerability": "VCID-p3uc-18e9-skb4" }, { "vulnerability": "VCID-p7ug-wwk5-63gb" }, { "vulnerability": "VCID-pb8n-hmsc-syfw" }, { "vulnerability": "VCID-pphm-ygb7-q7g2" }, { "vulnerability": "VCID-pzt3-abab-4kdd" }, { "vulnerability": "VCID-qnew-xqte-kbej" }, { "vulnerability": "VCID-qprv-989b-k3d3" }, { "vulnerability": "VCID-s4nf-p69f-pue8" }, { "vulnerability": "VCID-td6e-x2qb-syg3" }, { "vulnerability": "VCID-uunr-69dt-q7fn" }, { "vulnerability": "VCID-uvcp-ad38-2kcs" }, { "vulnerability": "VCID-vb2u-yc2z-ayh5" }, { "vulnerability": "VCID-vs9k-akwv-h3ak" }, { "vulnerability": "VCID-w2ch-guy5-6ye9" }, { "vulnerability": "VCID-wh75-sc4f-qqc1" }, { "vulnerability": "VCID-xcvw-eex8-j3bf" }, { "vulnerability": "VCID-xe4j-gg7f-wyfa" }, { "vulnerability": "VCID-z3g4-1vhq-97dj" }, { "vulnerability": "VCID-z3qj-cnxq-pkgq" }, { "vulnerability": "VCID-z8zf-cqkb-guge" }, { "vulnerability": "VCID-zkyv-h5at-xkgq" }, { "vulnerability": "VCID-zrxf-3w1d-t3ba" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.11.4%252B107-gef32c7afa2-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/994412?format=api", "purl": "pkg:deb/debian/xen@4.14.6-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1tb8-t91c-63bp" }, { "vulnerability": "VCID-26a9-9zz3-wfhh" }, { "vulnerability": "VCID-2trm-w3ww-cfhk" }, { "vulnerability": "VCID-3bw4-631f-e7h6" }, { "vulnerability": "VCID-3se4-qv6j-xqfq" }, { "vulnerability": "VCID-3vdg-5g64-wkbt" }, { "vulnerability": "VCID-46ad-1k9n-j3hm" }, { "vulnerability": "VCID-4cdt-ycjx-6ub4" }, { "vulnerability": "VCID-4k7p-3g95-n7dm" }, { "vulnerability": "VCID-4pra-prf3-1uff" }, { "vulnerability": "VCID-4rmg-db7g-u3hs" }, { "vulnerability": "VCID-5ktg-bhh1-ubbz" }, { "vulnerability": "VCID-5u88-jt28-cfb6" }, { "vulnerability": "VCID-6dax-cddv-7bbs" }, { "vulnerability": "VCID-6jqj-2qwn-8qd9" }, { "vulnerability": "VCID-8k1q-b2kj-w7hh" }, { "vulnerability": "VCID-8tv5-zxmm-r3fk" }, { "vulnerability": "VCID-97zm-r9b6-uqdu" }, { "vulnerability": "VCID-b57c-x3pw-7fb7" }, { "vulnerability": "VCID-bhdk-jmss-4qc8" }, { "vulnerability": "VCID-byu1-7n9c-5fes" }, { "vulnerability": "VCID-c4xu-szkm-1kh6" }, { "vulnerability": "VCID-ee3z-24pr-kqcm" }, { "vulnerability": "VCID-ejhc-6yqt-gkgv" }, { "vulnerability": "VCID-evcg-2z3p-gbch" }, { "vulnerability": "VCID-h9hz-vur7-kyhg" }, { "vulnerability": "VCID-j22f-mbqe-a7dk" }, { "vulnerability": "VCID-p2fk-8snj-x7dy" }, { "vulnerability": "VCID-psaa-jdr7-e3fm" }, { "vulnerability": "VCID-q3p3-tgay-6kcs" }, { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-rdub-9bhg-nbc6" }, { "vulnerability": "VCID-rk2f-yqbb-nyd2" }, { "vulnerability": "VCID-rt5n-e4wq-p3gh" }, { "vulnerability": "VCID-tjgh-waa3-wqgk" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-uv8m-bj4c-8fes" }, { "vulnerability": "VCID-vv23-mvyn-87hg" }, { "vulnerability": "VCID-wd4s-jxuf-skbp" }, { "vulnerability": "VCID-wz1m-aeaf-nkg7" }, { "vulnerability": "VCID-xqpz-y83m-4uc4" }, { "vulnerability": "VCID-ye1t-qhtx-sucm" }, { "vulnerability": "VCID-z9rm-9p2q-wfag" }, { "vulnerability": "VCID-zkeg-d5d5-vbda" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" } ], "aliases": [ "CVE-2020-28368", "XSA-351" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrxf-3w1d-t3ba" } ], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1" }