Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
Typedeb
Namespacedebian
Namexen
Version4.17.5+72-g01140da4e8-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-qpfc-3296-9ub3
vulnerability_id VCID-qpfc-3296-9ub3
summary x86: incomplete IBPB for vCPU isolation
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23553
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07141
published_at 2026-04-04T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07092
published_at 2026-04-02T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07522
published_at 2026-04-29T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07629
published_at 2026-04-21T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-24T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07553
published_at 2026-04-26T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07526
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07584
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07604
published_at 2026-04-09T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07603
published_at 2026-04-11T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.0759
published_at 2026-04-12T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07577
published_at 2026-04-13T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.075
published_at 2026-04-16T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07488
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23553
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-479.html
reference_id advisory-479.html
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:40:38Z/
url https://xenbits.xenproject.org/xsa/advisory-479.html
4
reference_url https://xenbits.xen.org/xsa/advisory-479.html
reference_id XSA-479
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-479.html
fixed_packages
0
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1
aliases CVE-2026-23553, XSA-479
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfc-3296-9ub3
1
url VCID-upju-tcz7-efg1
vulnerability_id VCID-upju-tcz7-efg1
summary x86: buffer overrun with shadow paging + tracing
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58150
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.02996
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02981
published_at 2026-04-02T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04374
published_at 2026-04-29T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04303
published_at 2026-04-21T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.0432
published_at 2026-04-24T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.0434
published_at 2026-04-26T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04206
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04238
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04253
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04237
published_at 2026-04-11T12:55:00Z
10
value 0.00017
scoring_system epss
scoring_elements 0.04222
published_at 2026-04-12T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04198
published_at 2026-04-13T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.04168
published_at 2026-04-16T12:55:00Z
13
value 0.00017
scoring_system epss
scoring_elements 0.04177
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58150
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-477.html
reference_id advisory-477.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T16:44:38Z/
url https://xenbits.xenproject.org/xsa/advisory-477.html
4
reference_url https://xenbits.xen.org/xsa/advisory-477.html
reference_id XSA-477
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-477.html
fixed_packages
0
url pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1
purl pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qsma-2ufh-jybe
1
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1
aliases CVE-2025-58150, XSA-477
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-upju-tcz7-efg1
2
url VCID-wx6w-6y5m-fugn
vulnerability_id VCID-wx6w-6y5m-fugn
summary Use after free of paging structures in EPT
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23554
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01593
published_at 2026-04-16T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01615
published_at 2026-04-02T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01698
published_at 2026-04-21T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01607
published_at 2026-04-18T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.01621
published_at 2026-04-07T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01622
published_at 2026-04-08T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01629
published_at 2026-04-09T12:55:00Z
7
value 0.00012
scoring_system epss
scoring_elements 0.01616
published_at 2026-04-11T12:55:00Z
8
value 0.00012
scoring_system epss
scoring_elements 0.01606
published_at 2026-04-12T12:55:00Z
9
value 0.00012
scoring_system epss
scoring_elements 0.01605
published_at 2026-04-13T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02541
published_at 2026-04-29T12:55:00Z
11
value 0.00014
scoring_system epss
scoring_elements 0.02489
published_at 2026-04-24T12:55:00Z
12
value 0.00014
scoring_system epss
scoring_elements 0.02477
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23554
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://xenbits.xenproject.org/xsa/advisory-480.html
reference_id advisory-480.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-23T14:18:54Z/
url https://xenbits.xenproject.org/xsa/advisory-480.html
3
reference_url https://xenbits.xen.org/xsa/advisory-480.html
reference_id XSA-480
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-480.html
fixed_packages
aliases CVE-2026-23554, XSA-480
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wx6w-6y5m-fugn
Fixing_vulnerabilities
0
url VCID-1tb8-t91c-63bp
vulnerability_id VCID-1tb8-t91c-63bp
summary x86: Native Branch History Injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2201
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08738
published_at 2026-04-29T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08769
published_at 2026-04-21T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.0878
published_at 2026-04-24T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08735
published_at 2026-04-26T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09139
published_at 2026-04-02T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-07T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09191
published_at 2026-04-04T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09057
published_at 2026-04-18T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09077
published_at 2026-04-16T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.0918
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09195
published_at 2026-04-12T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09226
published_at 2026-04-11T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09224
published_at 2026-04-09T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09194
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/04/09/15
reference_id 15
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url http://www.openwall.com/lists/oss-security/2024/04/09/15
5
reference_url https://www.kb.cert.org/vuls/id/155143
reference_id 155143
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url https://www.kb.cert.org/vuls/id/155143
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2268118
reference_id 2268118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2268118
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/
reference_id 6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/
8
reference_url http://www.openwall.com/lists/oss-security/2024/05/07/7
reference_id 7
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url http://www.openwall.com/lists/oss-security/2024/05/07/7
9
reference_url http://xenbits.xen.org/xsa/advisory-456.html
reference_id advisory-456.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url http://xenbits.xen.org/xsa/advisory-456.html
10
reference_url https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm
reference_id branch-history-injection.htm
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/
reference_id D5OK6MH75S7YWD34EWW7QIZTS627RIE3
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/
12
reference_url https://github.com/vusec/inspectre-gadget?tab=readme-ov-file
reference_id inspectre-gadget?tab=readme-ov-file
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url https://github.com/vusec/inspectre-gadget?tab=readme-ov-file
13
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
14
reference_url https://access.redhat.com/errata/RHSA-2024:5102
reference_id RHSA-2024:5102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5102
15
reference_url https://access.redhat.com/errata/RHSA-2024:6994
reference_id RHSA-2024:6994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6994
16
reference_url https://access.redhat.com/errata/RHSA-2024:6995
reference_id RHSA-2024:6995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6995
17
reference_url https://access.redhat.com/errata/RHSA-2024:8613
reference_id RHSA-2024:8613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8613
18
reference_url https://access.redhat.com/errata/RHSA-2024:8614
reference_id RHSA-2024:8614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8614
19
reference_url https://access.redhat.com/errata/RHSA-2024:8617
reference_id RHSA-2024:8617
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8617
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/
reference_id RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/
21
reference_url https://usn.ubuntu.com/6766-1/
reference_id USN-6766-1
reference_type
scores
url https://usn.ubuntu.com/6766-1/
22
reference_url https://usn.ubuntu.com/6766-2/
reference_id USN-6766-2
reference_type
scores
url https://usn.ubuntu.com/6766-2/
23
reference_url https://usn.ubuntu.com/6766-3/
reference_id USN-6766-3
reference_type
scores
url https://usn.ubuntu.com/6766-3/
24
reference_url https://usn.ubuntu.com/6774-1/
reference_id USN-6774-1
reference_type
scores
url https://usn.ubuntu.com/6774-1/
25
reference_url https://usn.ubuntu.com/6795-1/
reference_id USN-6795-1
reference_type
scores
url https://usn.ubuntu.com/6795-1/
26
reference_url https://usn.ubuntu.com/6828-1/
reference_id USN-6828-1
reference_type
scores
url https://usn.ubuntu.com/6828-1/
27
reference_url https://usn.ubuntu.com/6865-1/
reference_id USN-6865-1
reference_type
scores
url https://usn.ubuntu.com/6865-1/
28
reference_url https://usn.ubuntu.com/6866-1/
reference_id USN-6866-1
reference_type
scores
url https://usn.ubuntu.com/6866-1/
29
reference_url https://usn.ubuntu.com/6866-2/
reference_id USN-6866-2
reference_type
scores
url https://usn.ubuntu.com/6866-2/
30
reference_url https://usn.ubuntu.com/6866-3/
reference_id USN-6866-3
reference_type
scores
url https://usn.ubuntu.com/6866-3/
31
reference_url https://usn.ubuntu.com/6868-1/
reference_id USN-6868-1
reference_type
scores
url https://usn.ubuntu.com/6868-1/
32
reference_url https://usn.ubuntu.com/6868-2/
reference_id USN-6868-2
reference_type
scores
url https://usn.ubuntu.com/6868-2/
33
reference_url https://xenbits.xen.org/xsa/advisory-456.html
reference_id XSA-456
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-456.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-2201, XSA-456
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1tb8-t91c-63bp
1
url VCID-26a9-9zz3-wfhh
vulnerability_id VCID-26a9-9zz3-wfhh
summary x86: Incorrect input sanitisation in Viridian hypercalls
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58147
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06179
published_at 2026-04-07T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06166
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0626
published_at 2026-04-09T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06221
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06197
published_at 2026-04-04T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07718
published_at 2026-04-29T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07807
published_at 2026-04-21T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07764
published_at 2026-04-24T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-26T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07782
published_at 2026-04-11T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07769
published_at 2026-04-12T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07753
published_at 2026-04-13T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07667
published_at 2026-04-16T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07654
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58147
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-475.html
reference_id advisory-475.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-31T17:45:24Z/
url https://xenbits.xenproject.org/xsa/advisory-475.html
5
reference_url https://xenbits.xen.org/xsa/advisory-475.html
reference_id XSA-475
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-475.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58147, XSA-475
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26a9-9zz3-wfhh
2
url VCID-2trm-w3ww-cfhk
vulnerability_id VCID-2trm-w3ww-cfhk
summary Mutiple vulnerabilities in the Viridian interface
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27466
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.0691
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0696
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07717
published_at 2026-04-21T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07643
published_at 2026-04-26T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07611
published_at 2026-04-29T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-24T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08147
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08071
published_at 2026-04-07T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08132
published_at 2026-04-08T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08154
published_at 2026-04-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08127
published_at 2026-04-12T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.0811
published_at 2026-04-13T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08017
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27466
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-472.html
reference_id advisory-472.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:25:53Z/
url https://xenbits.xenproject.org/xsa/advisory-472.html
5
reference_url https://xenbits.xen.org/xsa/advisory-472.html
reference_id XSA-472
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-472.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-27466
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2trm-w3ww-cfhk
3
url VCID-3bw4-631f-e7h6
vulnerability_id VCID-3bw4-631f-e7h6
summary arm32: The cache may not be properly cleaned/invalidated
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34321
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17092
published_at 2026-04-29T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17151
published_at 2026-04-26T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17232
published_at 2026-04-18T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17324
published_at 2026-04-08T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17383
published_at 2026-04-09T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17395
published_at 2026-04-11T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17345
published_at 2026-04-12T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17287
published_at 2026-04-13T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17226
published_at 2026-04-16T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17266
published_at 2026-04-21T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17171
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34321
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954
reference_id 1051954
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954
3
reference_url https://xenbits.xenproject.org/xsa/advisory-437.html
reference_id advisory-437.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T15:52:01Z/
url https://xenbits.xenproject.org/xsa/advisory-437.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-437.html
reference_id XSA-437
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-437.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34321, XSA-437
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bw4-631f-e7h6
4
url VCID-3se4-qv6j-xqfq
vulnerability_id VCID-3se4-qv6j-xqfq
summary double unlock in x86 guest IRQ handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31143
reference_id
reference_type
scores
0
value 0.00568
scoring_system epss
scoring_elements 0.68631
published_at 2026-04-29T12:55:00Z
1
value 0.00568
scoring_system epss
scoring_elements 0.68542
published_at 2026-04-13T12:55:00Z
2
value 0.00568
scoring_system epss
scoring_elements 0.68582
published_at 2026-04-16T12:55:00Z
3
value 0.00568
scoring_system epss
scoring_elements 0.68594
published_at 2026-04-18T12:55:00Z
4
value 0.00568
scoring_system epss
scoring_elements 0.68621
published_at 2026-04-24T12:55:00Z
5
value 0.00568
scoring_system epss
scoring_elements 0.68626
published_at 2026-04-26T12:55:00Z
6
value 0.00568
scoring_system epss
scoring_elements 0.6849
published_at 2026-04-07T12:55:00Z
7
value 0.00568
scoring_system epss
scoring_elements 0.68541
published_at 2026-04-08T12:55:00Z
8
value 0.00568
scoring_system epss
scoring_elements 0.68558
published_at 2026-04-09T12:55:00Z
9
value 0.00568
scoring_system epss
scoring_elements 0.68585
published_at 2026-04-11T12:55:00Z
10
value 0.00568
scoring_system epss
scoring_elements 0.68572
published_at 2026-04-21T12:55:00Z
11
value 0.00676
scoring_system epss
scoring_elements 0.71439
published_at 2026-04-02T12:55:00Z
12
value 0.00676
scoring_system epss
scoring_elements 0.71456
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31143
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-458.html
reference_id advisory-458.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T13:31:44Z/
url https://xenbits.xenproject.org/xsa/advisory-458.html
4
reference_url https://xenbits.xen.org/xsa/advisory-458.html
reference_id XSA-458
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-458.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-31143, XSA-458
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3se4-qv6j-xqfq
5
url VCID-3vdg-5g64-wkbt
vulnerability_id VCID-3vdg-5g64-wkbt
summary x86: shadow stack vs exceptions from emulation stubs
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46841
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.19893
published_at 2026-04-29T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20217
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20041
published_at 2026-04-16T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20045
published_at 2026-04-18T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20044
published_at 2026-04-21T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.19928
published_at 2026-04-24T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.19923
published_at 2026-04-26T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20274
published_at 2026-04-04T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.19999
published_at 2026-04-07T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20079
published_at 2026-04-08T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20137
published_at 2026-04-09T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20162
published_at 2026-04-11T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20117
published_at 2026-04-12T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20059
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46841
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-451.html
reference_id advisory-451.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/
url https://xenbits.xenproject.org/xsa/advisory-451.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-451.html
reference_id XSA-451
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-451.html
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-46841, XSA-451
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdg-5g64-wkbt
6
url VCID-46ad-1k9n-j3hm
vulnerability_id VCID-46ad-1k9n-j3hm
summary Linux disk/nic frontends data leaks
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26365
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05607
published_at 2026-04-24T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05397
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0543
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05438
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05474
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05495
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05454
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05447
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05398
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05406
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-21T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07717
published_at 2026-04-29T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07741
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26365
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
reference_id 1014414
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414
12
reference_url https://usn.ubuntu.com/5572-1/
reference_id USN-5572-1
reference_type
scores
url https://usn.ubuntu.com/5572-1/
13
reference_url https://usn.ubuntu.com/5572-2/
reference_id USN-5572-2
reference_type
scores
url https://usn.ubuntu.com/5572-2/
14
reference_url https://usn.ubuntu.com/5579-1/
reference_id USN-5579-1
reference_type
scores
url https://usn.ubuntu.com/5579-1/
15
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
16
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
17
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
18
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
19
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
20
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
21
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
22
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
23
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
24
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
25
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
26
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
27
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
28
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
29
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
30
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
31
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
32
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
33
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
34
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
35
reference_url https://usn.ubuntu.com/5773-1/
reference_id USN-5773-1
reference_type
scores
url https://usn.ubuntu.com/5773-1/
36
reference_url https://usn.ubuntu.com/5789-1/
reference_id USN-5789-1
reference_type
scores
url https://usn.ubuntu.com/5789-1/
37
reference_url https://xenbits.xen.org/xsa/advisory-403.html
reference_id XSA-403
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-403.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2022-26365
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46ad-1k9n-j3hm
7
url VCID-4cdt-ycjx-6ub4
vulnerability_id VCID-4cdt-ycjx-6ub4
summary Linux disk/nic frontends data leaks
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33741
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05607
published_at 2026-04-24T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05397
published_at 2026-04-02T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.0543
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05438
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05474
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05495
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05468
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05454
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05447
published_at 2026-04-13T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.05398
published_at 2026-04-16T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05406
published_at 2026-04-18T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05575
published_at 2026-04-21T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07717
published_at 2026-04-29T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07741
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33741
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://usn.ubuntu.com/5572-1/
reference_id USN-5572-1
reference_type
scores
url https://usn.ubuntu.com/5572-1/
12
reference_url https://usn.ubuntu.com/5572-2/
reference_id USN-5572-2
reference_type
scores
url https://usn.ubuntu.com/5572-2/
13
reference_url https://usn.ubuntu.com/5579-1/
reference_id USN-5579-1
reference_type
scores
url https://usn.ubuntu.com/5579-1/
14
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
15
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
16
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
17
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
18
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
19
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
20
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
21
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
22
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
23
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
24
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
25
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
26
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
27
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
28
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
29
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
30
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
31
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
32
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
33
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
34
reference_url https://xenbits.xen.org/xsa/advisory-403.html
reference_id XSA-403
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-403.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2022-33741, XSA-403
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cdt-ycjx-6ub4
8
url VCID-4k7p-3g95-n7dm
vulnerability_id VCID-4k7p-3g95-n7dm
summary Deadlock in x86 HVM standard VGA handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45818
reference_id
reference_type
scores
0
value 0.00169
scoring_system epss
scoring_elements 0.38139
published_at 2026-04-02T12:55:00Z
1
value 0.00169
scoring_system epss
scoring_elements 0.38162
published_at 2026-04-04T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42152
published_at 2026-04-29T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42306
published_at 2026-04-21T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42239
published_at 2026-04-24T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42234
published_at 2026-04-26T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.4234
published_at 2026-04-07T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42388
published_at 2026-04-08T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.42396
published_at 2026-04-09T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.42418
published_at 2026-04-11T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42382
published_at 2026-04-12T12:55:00Z
11
value 0.00202
scoring_system epss
scoring_elements 0.42354
published_at 2026-04-13T12:55:00Z
12
value 0.00202
scoring_system epss
scoring_elements 0.42403
published_at 2026-04-16T12:55:00Z
13
value 0.00202
scoring_system epss
scoring_elements 0.42378
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45818
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-463.html
reference_id advisory-463.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:59:24Z/
url https://xenbits.xenproject.org/xsa/advisory-463.html
4
reference_url https://xenbits.xen.org/xsa/advisory-463.html
reference_id XSA-463
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-463.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-45818, XSA-463
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k7p-3g95-n7dm
9
url VCID-4pra-prf3-1uff
vulnerability_id VCID-4pra-prf3-1uff
summary Incorrect removal of permissions on PCI device unplug
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58149
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11486
published_at 2026-04-07T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11656
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11634
published_at 2026-04-09T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11572
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11701
published_at 2026-04-04T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17679
published_at 2026-04-29T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17836
published_at 2026-04-21T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17743
published_at 2026-04-24T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1772
published_at 2026-04-26T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1794
published_at 2026-04-11T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17895
published_at 2026-04-12T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17847
published_at 2026-04-13T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17789
published_at 2026-04-16T12:55:00Z
13
value 0.00057
scoring_system epss
scoring_elements 0.17798
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58149
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-476.html
reference_id advisory-476.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:24:29Z/
url https://xenbits.xenproject.org/xsa/advisory-476.html
5
reference_url https://xenbits.xen.org/xsa/advisory-476.html
reference_id XSA-476
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-476.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58149, XSA-476
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4pra-prf3-1uff
10
url VCID-4rmg-db7g-u3hs
vulnerability_id VCID-4rmg-db7g-u3hs
summary pci: phantom functions assigned to incorrect contexts
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46839
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.4893
published_at 2026-04-02T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48913
published_at 2026-04-29T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48959
published_at 2026-04-26T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49005
published_at 2026-04-16T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49001
published_at 2026-04-18T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48955
published_at 2026-04-04T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48909
published_at 2026-04-07T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48963
published_at 2026-04-21T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48961
published_at 2026-04-09T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.48977
published_at 2026-04-11T12:55:00Z
10
value 0.00256
scoring_system epss
scoring_elements 0.48951
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46839
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270533
reference_id 2270533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270533
5
reference_url https://xenbits.xenproject.org/xsa/advisory-449.html
reference_id advisory-449.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:00:00Z/
url https://xenbits.xenproject.org/xsa/advisory-449.html
6
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
7
reference_url https://xenbits.xen.org/xsa/advisory-449.html
reference_id XSA-449
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-449.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-46839, XSA-449
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rmg-db7g-u3hs
11
url VCID-5ktg-bhh1-ubbz
vulnerability_id VCID-5ktg-bhh1-ubbz
summary arm: Guests can trigger a deadlock on Cortex-A77
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34320
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28247
published_at 2026-04-29T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28734
published_at 2026-04-02T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28782
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28589
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28655
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28695
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28697
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28653
published_at 2026-04-12T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28605
published_at 2026-04-13T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28625
published_at 2026-04-16T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.286
published_at 2026-04-18T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28551
published_at 2026-04-21T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28435
published_at 2026-04-24T12:55:00Z
13
value 0.00105
scoring_system epss
scoring_elements 0.28323
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34320
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-436.html
reference_id XSA-436
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-436.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34320, XSA-436
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktg-bhh1-ubbz
12
url VCID-5u88-jt28-cfb6
vulnerability_id VCID-5u88-jt28-cfb6
summary deadlock potential with VT-d and legacy PCI device pass-through
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1713
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24787
published_at 2026-04-07T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25699
published_at 2026-04-11T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25689
published_at 2026-04-09T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25643
published_at 2026-04-08T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.30582
published_at 2026-04-29T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.30994
published_at 2026-04-16T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.30976
published_at 2026-04-18T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.30943
published_at 2026-04-21T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30784
published_at 2026-04-24T12:55:00Z
9
value 0.0012
scoring_system epss
scoring_elements 0.30665
published_at 2026-04-26T12:55:00Z
10
value 0.0012
scoring_system epss
scoring_elements 0.31009
published_at 2026-04-12T12:55:00Z
11
value 0.0012
scoring_system epss
scoring_elements 0.30964
published_at 2026-04-13T12:55:00Z
12
value 0.00223
scoring_system epss
scoring_elements 0.44966
published_at 2026-04-04T12:55:00Z
13
value 0.00223
scoring_system epss
scoring_elements 0.44946
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1713
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-467.html
reference_id advisory-467.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:17:20Z/
url https://xenbits.xenproject.org/xsa/advisory-467.html
4
reference_url https://xenbits.xen.org/xsa/advisory-467.html
reference_id XSA-467
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-467.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-1713, XSA-467
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5u88-jt28-cfb6
13
url VCID-6dax-cddv-7bbs
vulnerability_id VCID-6dax-cddv-7bbs
summary x86/AMD: Debug Mask handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34328
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29567
published_at 2026-04-29T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29998
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.2986
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29921
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29963
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29916
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29867
published_at 2026-04-13T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-16T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-18T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-21T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.29742
published_at 2026-04-24T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29629
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34328
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://xenbits.xen.org/xsa/advisory-444.html
reference_id XSA-444
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-444.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34328, XSA-444
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dax-cddv-7bbs
14
url VCID-6jqj-2qwn-8qd9
vulnerability_id VCID-6jqj-2qwn-8qd9
summary x86/AMD: Debug Mask handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34327
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29567
published_at 2026-04-29T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29998
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-21T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29742
published_at 2026-04-24T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29629
published_at 2026-04-26T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.30046
published_at 2026-04-04T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.2986
published_at 2026-04-07T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29921
published_at 2026-04-08T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29958
published_at 2026-04-09T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29963
published_at 2026-04-11T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29916
published_at 2026-04-12T12:55:00Z
11
value 0.00113
scoring_system epss
scoring_elements 0.29867
published_at 2026-04-13T12:55:00Z
12
value 0.00113
scoring_system epss
scoring_elements 0.29885
published_at 2026-04-16T12:55:00Z
13
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34327
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-444.html
reference_id advisory-444.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:36:52Z/
url https://xenbits.xenproject.org/xsa/advisory-444.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-444.html
reference_id XSA-444
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-444.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34327
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6jqj-2qwn-8qd9
15
url VCID-8k1q-b2kj-w7hh
vulnerability_id VCID-8k1q-b2kj-w7hh
summary Multiple vulnerabilities in libfsimage disk handling
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34325
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.2128
published_at 2026-04-29T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21614
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21449
published_at 2026-04-21T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21301
published_at 2026-04-24T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.213
published_at 2026-04-26T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21671
published_at 2026-04-04T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21426
published_at 2026-04-07T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21503
published_at 2026-04-08T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21562
published_at 2026-04-09T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21573
published_at 2026-04-11T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21535
published_at 2026-04-12T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21479
published_at 2026-04-13T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21475
published_at 2026-04-16T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.2148
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34325
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-443.html
reference_id advisory-443.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-30T18:38:25Z/
url https://xenbits.xenproject.org/xsa/advisory-443.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-443.html
reference_id XSA-443
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-443.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34325, XSA-443
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1q-b2kj-w7hh
16
url VCID-8tv5-zxmm-r3fk
vulnerability_id VCID-8tv5-zxmm-r3fk
summary x86/AMD: Divide speculative information leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json
reference_id
reference_type
scores
0
value 6.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-20588
reference_id
reference_type
scores
0
value 0.06701
scoring_system epss
scoring_elements 0.91275
published_at 2026-04-21T12:55:00Z
1
value 0.06701
scoring_system epss
scoring_elements 0.91286
published_at 2026-04-26T12:55:00Z
2
value 0.06872
scoring_system epss
scoring_elements 0.91406
published_at 2026-04-29T12:55:00Z
3
value 0.07781
scoring_system epss
scoring_elements 0.91965
published_at 2026-04-09T12:55:00Z
4
value 0.07781
scoring_system epss
scoring_elements 0.91933
published_at 2026-04-02T12:55:00Z
5
value 0.07781
scoring_system epss
scoring_elements 0.9194
published_at 2026-04-04T12:55:00Z
6
value 0.07781
scoring_system epss
scoring_elements 0.91947
published_at 2026-04-07T12:55:00Z
7
value 0.07781
scoring_system epss
scoring_elements 0.9196
published_at 2026-04-08T12:55:00Z
8
value 0.07781
scoring_system epss
scoring_elements 0.9198
published_at 2026-04-18T12:55:00Z
9
value 0.07781
scoring_system epss
scoring_elements 0.91983
published_at 2026-04-16T12:55:00Z
10
value 0.07781
scoring_system epss
scoring_elements 0.91963
published_at 2026-04-13T12:55:00Z
11
value 0.07781
scoring_system epss
scoring_elements 0.91967
published_at 2026-04-12T12:55:00Z
12
value 0.07781
scoring_system epss
scoring_elements 0.91968
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-20588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273
33
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
34
reference_url http://www.openwall.com/lists/oss-security/2023/09/27/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/27/1
35
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/1
36
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/12
37
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/13
38
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/14
reference_id 14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/14
39
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/15
reference_id 15
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/15
40
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/16
reference_id 16
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/16
41
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/2
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2230125
reference_id 2230125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2230125
43
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/3
44
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/3
45
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/4
reference_id 4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/4
46
reference_url http://www.openwall.com/lists/oss-security/2023/10/04/4
reference_id 4
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/04/4
47
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/5
reference_id 5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/5
48
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/5
reference_id 5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/5
49
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/7
50
reference_url http://www.openwall.com/lists/oss-security/2023/09/25/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/25/8
51
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/8
52
reference_url http://www.openwall.com/lists/oss-security/2023/09/26/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/09/26/9
53
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/9
54
reference_url http://xenbits.xen.org/xsa/advisory-439.html
reference_id advisory-439.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url http://xenbits.xen.org/xsa/advisory-439.html
55
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/
reference_id AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/
56
reference_url https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007
reference_id AMD-SB-7007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007
57
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/
reference_id DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/
58
reference_url https://www.debian.org/security/2023/dsa-5480
reference_id dsa-5480
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://www.debian.org/security/2023/dsa-5480
59
reference_url https://www.debian.org/security/2023/dsa-5492
reference_id dsa-5492
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://www.debian.org/security/2023/dsa-5492
60
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/
reference_id KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/
61
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
62
reference_url https://security.netapp.com/advisory/ntap-20240531-0005/
reference_id ntap-20240531-0005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/
url https://security.netapp.com/advisory/ntap-20240531-0005/
63
reference_url https://usn.ubuntu.com/6383-1/
reference_id USN-6383-1
reference_type
scores
url https://usn.ubuntu.com/6383-1/
64
reference_url https://usn.ubuntu.com/6384-1/
reference_id USN-6384-1
reference_type
scores
url https://usn.ubuntu.com/6384-1/
65
reference_url https://usn.ubuntu.com/6386-1/
reference_id USN-6386-1
reference_type
scores
url https://usn.ubuntu.com/6386-1/
66
reference_url https://usn.ubuntu.com/6386-2/
reference_id USN-6386-2
reference_type
scores
url https://usn.ubuntu.com/6386-2/
67
reference_url https://usn.ubuntu.com/6386-3/
reference_id USN-6386-3
reference_type
scores
url https://usn.ubuntu.com/6386-3/
68
reference_url https://usn.ubuntu.com/6387-1/
reference_id USN-6387-1
reference_type
scores
url https://usn.ubuntu.com/6387-1/
69
reference_url https://usn.ubuntu.com/6387-2/
reference_id USN-6387-2
reference_type
scores
url https://usn.ubuntu.com/6387-2/
70
reference_url https://usn.ubuntu.com/6466-1/
reference_id USN-6466-1
reference_type
scores
url https://usn.ubuntu.com/6466-1/
71
reference_url https://usn.ubuntu.com/6577-1/
reference_id USN-6577-1
reference_type
scores
url https://usn.ubuntu.com/6577-1/
72
reference_url https://usn.ubuntu.com/6602-1/
reference_id USN-6602-1
reference_type
scores
url https://usn.ubuntu.com/6602-1/
73
reference_url https://usn.ubuntu.com/6604-1/
reference_id USN-6604-1
reference_type
scores
url https://usn.ubuntu.com/6604-1/
74
reference_url https://usn.ubuntu.com/6604-2/
reference_id USN-6604-2
reference_type
scores
url https://usn.ubuntu.com/6604-2/
75
reference_url https://xenbits.xen.org/xsa/advisory-439.html
reference_id XSA-439
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-439.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-20588, XSA-439
risk_score 2.7
exploitability 0.5
weighted_severity 5.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv5-zxmm-r3fk
17
url VCID-97zm-r9b6-uqdu
vulnerability_id VCID-97zm-r9b6-uqdu
summary xenstored: A transaction conflict can crash C Xenstored
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34323
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24872
published_at 2026-04-29T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25175
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24991
published_at 2026-04-21T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24929
published_at 2026-04-24T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24917
published_at 2026-04-26T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25216
published_at 2026-04-04T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24987
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25055
published_at 2026-04-08T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.251
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25114
published_at 2026-04-11T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.25074
published_at 2026-04-12T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.2502
published_at 2026-04-13T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.25029
published_at 2026-04-16T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34323
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-440.html
reference_id advisory-440.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T16:40:56Z/
url https://xenbits.xenproject.org/xsa/advisory-440.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-440.html
reference_id XSA-440
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-440.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34323, XSA-440
risk_score 1.4
exploitability 0.5
weighted_severity 2.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-97zm-r9b6-uqdu
18
url VCID-b57c-x3pw-7fb7
vulnerability_id VCID-b57c-x3pw-7fb7
summary top-level shadow reference dropped too early for 64-bit PV guests
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34322
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18143
published_at 2026-04-29T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18518
published_at 2026-04-02T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18295
published_at 2026-04-21T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18196
published_at 2026-04-24T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.1818
published_at 2026-04-26T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18573
published_at 2026-04-04T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18279
published_at 2026-04-07T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18362
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.18414
published_at 2026-04-11T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18366
published_at 2026-04-12T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18315
published_at 2026-04-13T12:55:00Z
11
value 0.00058
scoring_system epss
scoring_elements 0.18259
published_at 2026-04-16T12:55:00Z
12
value 0.00058
scoring_system epss
scoring_elements 0.18271
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34322
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-438.html
reference_id advisory-438.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:50:09Z/
url https://xenbits.xenproject.org/xsa/advisory-438.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-438.html
reference_id XSA-438
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-438.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34322, XSA-438
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b57c-x3pw-7fb7
19
url VCID-bhdk-jmss-4qc8
vulnerability_id VCID-bhdk-jmss-4qc8
summary x86: BTC/SRSO fixes not fully effective
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46836
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05862
published_at 2026-04-29T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05604
published_at 2026-04-02T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05783
published_at 2026-04-21T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05815
published_at 2026-04-24T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05852
published_at 2026-04-26T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05645
published_at 2026-04-04T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05638
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05676
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05703
published_at 2026-04-09T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05682
published_at 2026-04-11T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05674
published_at 2026-04-12T12:55:00Z
11
value 0.00021
scoring_system epss
scoring_elements 0.05668
published_at 2026-04-13T12:55:00Z
12
value 0.00021
scoring_system epss
scoring_elements 0.05623
published_at 2026-04-16T12:55:00Z
13
value 0.00021
scoring_system epss
scoring_elements 0.05635
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46836
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
reference_id 1056928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
4
reference_url https://xenbits.xenproject.org/xsa/advisory-446.html
reference_id advisory-446.html
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:16:12Z/
url https://xenbits.xenproject.org/xsa/advisory-446.html
5
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
6
reference_url https://xenbits.xen.org/xsa/advisory-446.html
reference_id XSA-446
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-446.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-46836, XSA-446
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhdk-jmss-4qc8
20
url VCID-byu1-7n9c-5fes
vulnerability_id VCID-byu1-7n9c-5fes
summary GhostRace: Speculative Race Conditions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2193
reference_id
reference_type
scores
0
value 0.00889
scoring_system epss
scoring_elements 0.75447
published_at 2026-04-02T12:55:00Z
1
value 0.00897
scoring_system epss
scoring_elements 0.75714
published_at 2026-04-29T12:55:00Z
2
value 0.00897
scoring_system epss
scoring_elements 0.75606
published_at 2026-04-04T12:55:00Z
3
value 0.00897
scoring_system epss
scoring_elements 0.75587
published_at 2026-04-07T12:55:00Z
4
value 0.00897
scoring_system epss
scoring_elements 0.75621
published_at 2026-04-08T12:55:00Z
5
value 0.00897
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-09T12:55:00Z
6
value 0.00897
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-11T12:55:00Z
7
value 0.00897
scoring_system epss
scoring_elements 0.75638
published_at 2026-04-12T12:55:00Z
8
value 0.00897
scoring_system epss
scoring_elements 0.75631
published_at 2026-04-13T12:55:00Z
9
value 0.00897
scoring_system epss
scoring_elements 0.75669
published_at 2026-04-16T12:55:00Z
10
value 0.00897
scoring_system epss
scoring_elements 0.75673
published_at 2026-04-18T12:55:00Z
11
value 0.00897
scoring_system epss
scoring_elements 0.75658
published_at 2026-04-21T12:55:00Z
12
value 0.00897
scoring_system epss
scoring_elements 0.75697
published_at 2026-04-24T12:55:00Z
13
value 0.00897
scoring_system epss
scoring_elements 0.75702
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2193
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/03/12/14
reference_id 14
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url http://www.openwall.com/lists/oss-security/2024/03/12/14
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262051
reference_id 2262051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262051
6
reference_url https://kb.cert.org/vuls/id/488902
reference_id 488902
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://kb.cert.org/vuls/id/488902
7
reference_url https://www.kb.cert.org/vuls/id/488902
reference_id 488902
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://www.kb.cert.org/vuls/id/488902
8
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
reference_id amd-sb-7016.html
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
reference_id EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
10
reference_url https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
reference_id ghostrace
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
11
reference_url https://www.vusec.net/projects/ghostrace/
reference_id ghostrace
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://www.vusec.net/projects/ghostrace/
12
reference_url https://download.vusec.net/papers/ghostrace_sec24.pdf
reference_id ghostrace_sec24.pdf
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://download.vusec.net/papers/ghostrace_sec24.pdf
13
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
reference_id H63LGAQXPEVJOES73U4XK65I6DASOAAG
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
15
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
reference_id ?id=944d5fe50f3f03daacfea16300e656a1691c4a23
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
16
reference_url https://xenbits.xen.org/xsa/advisory-453.html
reference_id XSA-453
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://xenbits.xen.org/xsa/advisory-453.html
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-2193, XSA-453
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-byu1-7n9c-5fes
21
url VCID-c4xu-szkm-1kh6
vulnerability_id VCID-c4xu-szkm-1kh6
summary Arm issues with page refcounting
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58145
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13678
published_at 2026-04-04T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13617
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13724
published_at 2026-04-29T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13739
published_at 2026-04-18T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13813
published_at 2026-04-21T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13836
published_at 2026-04-24T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13805
published_at 2026-04-26T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14717
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14679
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14624
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14515
published_at 2026-04-16T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14697
published_at 2026-04-08T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14757
published_at 2026-04-09T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14609
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58145
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
3
reference_url https://xenbits.xenproject.org/xsa/advisory-473.html
reference_id advisory-473.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:39:37Z/
url https://xenbits.xenproject.org/xsa/advisory-473.html
4
reference_url https://xenbits.xen.org/xsa/advisory-473.html
reference_id XSA-473
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-473.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58145
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4xu-szkm-1kh6
22
url VCID-ee3z-24pr-kqcm
vulnerability_id VCID-ee3z-24pr-kqcm
summary error handling in x86 IOMMU identity mapping
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31145
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20795
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.2194
published_at 2026-04-29T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22106
published_at 2026-04-21T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.21966
published_at 2026-04-24T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.21953
published_at 2026-04-26T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22101
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22184
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22238
published_at 2026-04-09T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22257
published_at 2026-04-11T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22216
published_at 2026-04-12T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22155
published_at 2026-04-13T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-16T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.2215
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31145
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-460.html
reference_id advisory-460.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:27:44Z/
url https://xenbits.xenproject.org/xsa/advisory-460.html
4
reference_url https://xenbits.xen.org/xsa/advisory-460.html
reference_id XSA-460
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-460.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-31145, XSA-460
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ee3z-24pr-kqcm
23
url VCID-ejhc-6yqt-gkgv
vulnerability_id VCID-ejhc-6yqt-gkgv
summary x86: Indirect Target Selection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
reference_id
reference_type
scores
0
value 0.00091
scoring_system epss
scoring_elements 0.25696
published_at 2026-04-09T12:55:00Z
1
value 0.00091
scoring_system epss
scoring_elements 0.25764
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25806
published_at 2026-04-04T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25577
published_at 2026-04-07T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.2565
published_at 2026-04-08T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25706
published_at 2026-04-11T12:55:00Z
6
value 0.00227
scoring_system epss
scoring_elements 0.45504
published_at 2026-04-21T12:55:00Z
7
value 0.00227
scoring_system epss
scoring_elements 0.45428
published_at 2026-04-26T12:55:00Z
8
value 0.00227
scoring_system epss
scoring_elements 0.4551
published_at 2026-04-13T12:55:00Z
9
value 0.00227
scoring_system epss
scoring_elements 0.45557
published_at 2026-04-16T12:55:00Z
10
value 0.00227
scoring_system epss
scoring_elements 0.45554
published_at 2026-04-18T12:55:00Z
11
value 0.00227
scoring_system epss
scoring_elements 0.45419
published_at 2026-04-24T12:55:00Z
12
value 0.00227
scoring_system epss
scoring_elements 0.45368
published_at 2026-04-29T12:55:00Z
13
value 0.00227
scoring_system epss
scoring_elements 0.45505
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
reference_id 1105172
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
reference_id 1105193
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
reference_id 2366125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366125
7
reference_url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
reference_id intel-sa-01153.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value 5.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/
url https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html
8
reference_url https://access.redhat.com/errata/RHSA-2025:10101
reference_id RHSA-2025:10101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10101
9
reference_url https://access.redhat.com/errata/RHSA-2025:10102
reference_id RHSA-2025:10102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10102
10
reference_url https://access.redhat.com/errata/RHSA-2025:10103
reference_id RHSA-2025:10103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10103
11
reference_url https://access.redhat.com/errata/RHSA-2025:10107
reference_id RHSA-2025:10107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10107
12
reference_url https://access.redhat.com/errata/RHSA-2025:10108
reference_id RHSA-2025:10108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10108
13
reference_url https://access.redhat.com/errata/RHSA-2025:10109
reference_id RHSA-2025:10109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10109
14
reference_url https://access.redhat.com/errata/RHSA-2025:10111
reference_id RHSA-2025:10111
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10111
15
reference_url https://access.redhat.com/errata/RHSA-2025:10126
reference_id RHSA-2025:10126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10126
16
reference_url https://access.redhat.com/errata/RHSA-2025:10162
reference_id RHSA-2025:10162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10162
17
reference_url https://access.redhat.com/errata/RHSA-2025:10991
reference_id RHSA-2025:10991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10991
18
reference_url https://access.redhat.com/errata/RHSA-2025:13962
reference_id RHSA-2025:13962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13962
19
reference_url https://access.redhat.com/errata/RHSA-2025:19962
reference_id RHSA-2025:19962
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19962
20
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
21
reference_url https://usn.ubuntu.com/7535-1/
reference_id USN-7535-1
reference_type
scores
url https://usn.ubuntu.com/7535-1/
22
reference_url https://xenbits.xen.org/xsa/advisory-469.html
reference_id XSA-469
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-469.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-28956, XSA-469
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv
24
url VCID-evcg-2z3p-gbch
vulnerability_id VCID-evcg-2z3p-gbch
summary PCI device pass-through with shared resources
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31146
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20795
published_at 2026-04-02T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.2194
published_at 2026-04-29T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22106
published_at 2026-04-21T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.21966
published_at 2026-04-24T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.21953
published_at 2026-04-26T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22101
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22184
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22238
published_at 2026-04-09T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22257
published_at 2026-04-11T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22216
published_at 2026-04-12T12:55:00Z
11
value 0.00073
scoring_system epss
scoring_elements 0.22155
published_at 2026-04-13T12:55:00Z
12
value 0.00073
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-16T12:55:00Z
13
value 0.00073
scoring_system epss
scoring_elements 0.2215
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31146
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-461.html
reference_id advisory-461.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:14:46Z/
url https://xenbits.xenproject.org/xsa/advisory-461.html
4
reference_url https://xenbits.xen.org/xsa/advisory-461.html
reference_id XSA-461
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-461.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-31146
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-evcg-2z3p-gbch
25
url VCID-h9hz-vur7-kyhg
vulnerability_id VCID-h9hz-vur7-kyhg
summary x86: Incorrect input sanitisation in Viridian hypercalls
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58148
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06179
published_at 2026-04-07T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06166
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.0626
published_at 2026-04-09T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06221
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06197
published_at 2026-04-04T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07718
published_at 2026-04-29T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07807
published_at 2026-04-21T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07764
published_at 2026-04-24T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07742
published_at 2026-04-26T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07782
published_at 2026-04-11T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07769
published_at 2026-04-12T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07753
published_at 2026-04-13T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07667
published_at 2026-04-16T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07654
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58148
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-475.html
reference_id advisory-475.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:25:18Z/
url https://xenbits.xenproject.org/xsa/advisory-475.html
5
reference_url https://xenbits.xen.org/xsa/advisory-475.html
reference_id XSA-475
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-475.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58148
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h9hz-vur7-kyhg
26
url VCID-j22f-mbqe-a7dk
vulnerability_id VCID-j22f-mbqe-a7dk
summary x86: Transitive Scheduler Attacks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36350
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01827
published_at 2026-04-29T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01788
published_at 2026-04-24T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01783
published_at 2026-04-26T12:55:00Z
3
value 0.00013
scoring_system epss
scoring_elements 0.02204
published_at 2026-04-21T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08277
published_at 2026-04-02T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09297
published_at 2026-04-07T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09372
published_at 2026-04-08T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.0942
published_at 2026-04-09T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09434
published_at 2026-04-11T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09405
published_at 2026-04-12T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0928
published_at 2026-04-16T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09282
published_at 2026-04-18T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.0939
published_at 2026-04-13T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09385
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36350
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035
reference_id 1109035
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2350725
reference_id 2350725
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2350725
6
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html
reference_id amd-sb-7029.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T20:23:14Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html
7
reference_url https://access.redhat.com/errata/RHSA-2025:19930
reference_id RHSA-2025:19930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19930
8
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
9
reference_url https://access.redhat.com/errata/RHSA-2025:20518
reference_id RHSA-2025:20518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20518
10
reference_url https://usn.ubuntu.com/7833-1/
reference_id USN-7833-1
reference_type
scores
url https://usn.ubuntu.com/7833-1/
11
reference_url https://usn.ubuntu.com/7833-2/
reference_id USN-7833-2
reference_type
scores
url https://usn.ubuntu.com/7833-2/
12
reference_url https://usn.ubuntu.com/7833-3/
reference_id USN-7833-3
reference_type
scores
url https://usn.ubuntu.com/7833-3/
13
reference_url https://usn.ubuntu.com/7833-4/
reference_id USN-7833-4
reference_type
scores
url https://usn.ubuntu.com/7833-4/
14
reference_url https://usn.ubuntu.com/7834-1/
reference_id USN-7834-1
reference_type
scores
url https://usn.ubuntu.com/7834-1/
15
reference_url https://usn.ubuntu.com/7848-1/
reference_id USN-7848-1
reference_type
scores
url https://usn.ubuntu.com/7848-1/
16
reference_url https://usn.ubuntu.com/7856-1/
reference_id USN-7856-1
reference_type
scores
url https://usn.ubuntu.com/7856-1/
17
reference_url https://usn.ubuntu.com/8028-1/
reference_id USN-8028-1
reference_type
scores
url https://usn.ubuntu.com/8028-1/
18
reference_url https://usn.ubuntu.com/8028-2/
reference_id USN-8028-2
reference_type
scores
url https://usn.ubuntu.com/8028-2/
19
reference_url https://usn.ubuntu.com/8028-3/
reference_id USN-8028-3
reference_type
scores
url https://usn.ubuntu.com/8028-3/
20
reference_url https://usn.ubuntu.com/8028-4/
reference_id USN-8028-4
reference_type
scores
url https://usn.ubuntu.com/8028-4/
21
reference_url https://usn.ubuntu.com/8028-5/
reference_id USN-8028-5
reference_type
scores
url https://usn.ubuntu.com/8028-5/
22
reference_url https://usn.ubuntu.com/8028-6/
reference_id USN-8028-6
reference_type
scores
url https://usn.ubuntu.com/8028-6/
23
reference_url https://usn.ubuntu.com/8028-7/
reference_id USN-8028-7
reference_type
scores
url https://usn.ubuntu.com/8028-7/
24
reference_url https://usn.ubuntu.com/8028-8/
reference_id USN-8028-8
reference_type
scores
url https://usn.ubuntu.com/8028-8/
25
reference_url https://usn.ubuntu.com/8031-1/
reference_id USN-8031-1
reference_type
scores
url https://usn.ubuntu.com/8031-1/
26
reference_url https://usn.ubuntu.com/8031-2/
reference_id USN-8031-2
reference_type
scores
url https://usn.ubuntu.com/8031-2/
27
reference_url https://usn.ubuntu.com/8031-3/
reference_id USN-8031-3
reference_type
scores
url https://usn.ubuntu.com/8031-3/
28
reference_url https://usn.ubuntu.com/8052-1/
reference_id USN-8052-1
reference_type
scores
url https://usn.ubuntu.com/8052-1/
29
reference_url https://usn.ubuntu.com/8052-2/
reference_id USN-8052-2
reference_type
scores
url https://usn.ubuntu.com/8052-2/
30
reference_url https://usn.ubuntu.com/8074-1/
reference_id USN-8074-1
reference_type
scores
url https://usn.ubuntu.com/8074-1/
31
reference_url https://usn.ubuntu.com/8074-2/
reference_id USN-8074-2
reference_type
scores
url https://usn.ubuntu.com/8074-2/
32
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
33
reference_url https://xenbits.xen.org/xsa/advisory-471.html
reference_id XSA-471
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-471.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-36350
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j22f-mbqe-a7dk
27
url VCID-p2fk-8snj-x7dy
vulnerability_id VCID-p2fk-8snj-x7dy
summary x86: Register File Data Sampling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14976
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15014
published_at 2026-04-26T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15012
published_at 2026-04-24T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15419
published_at 2026-04-29T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15947
published_at 2026-04-04T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15885
published_at 2026-04-02T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15693
published_at 2026-04-18T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15683
published_at 2026-04-16T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-13T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.1583
published_at 2026-04-12T12:55:00Z
10
value 0.00051
scoring_system epss
scoring_elements 0.15868
published_at 2026-04-11T12:55:00Z
11
value 0.00051
scoring_system epss
scoring_elements 0.15893
published_at 2026-04-09T12:55:00Z
12
value 0.00051
scoring_system epss
scoring_elements 0.15831
published_at 2026-04-08T12:55:00Z
13
value 0.00051
scoring_system epss
scoring_elements 0.15746
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814
145
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816
146
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817
147
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820
148
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825
149
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833
150
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835
151
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839
152
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840
153
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843
154
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845
155
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846
156
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851
157
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852
158
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855
159
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857
160
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859
161
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861
162
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862
163
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863
164
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870
165
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872
166
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874
167
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875
168
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877
169
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878
170
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880
171
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882
172
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883
173
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884
174
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885
175
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889
176
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891
177
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894
178
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895
179
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897
180
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898
181
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901
182
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903
183
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906
184
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907
185
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910
186
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917
187
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922
188
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923
189
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924
190
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925
191
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926
192
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931
193
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934
194
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935
195
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937
196
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950
197
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951
198
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955
199
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956
200
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957
201
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958
202
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960
203
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961
204
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965
205
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966
206
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969
207
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970
208
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973
209
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974
210
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976
211
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978
212
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981
213
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984
214
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988
215
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993
216
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994
217
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997
218
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999
219
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000
220
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001
221
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004
222
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008
223
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013
224
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020
225
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024
226
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025
227
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028
228
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030
229
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038
230
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043
231
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044
232
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045
233
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046
234
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047
235
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051
236
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052
237
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053
238
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059
239
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065
240
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073
241
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074
242
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075
243
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076
244
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077
245
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078
246
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388
247
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437
248
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
249
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
reference_id 1066108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108
250
reference_url http://www.openwall.com/lists/oss-security/2024/03/12/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url http://www.openwall.com/lists/oss-security/2024/03/12/13
251
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
reference_id 2270700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270700
252
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
reference_id EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
253
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
254
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
reference_id H63LGAQXPEVJOES73U4XK65I6DASOAAG
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
255
reference_url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
reference_id intel-sa-00898.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
256
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
reference_id msg00003.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
257
reference_url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
258
reference_url https://access.redhat.com/errata/RHSA-2024:5101
reference_id RHSA-2024:5101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5101
259
reference_url https://access.redhat.com/errata/RHSA-2024:8157
reference_id RHSA-2024:8157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8157
260
reference_url https://access.redhat.com/errata/RHSA-2024:8158
reference_id RHSA-2024:8158
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8158
261
reference_url https://access.redhat.com/errata/RHSA-2024:8162
reference_id RHSA-2024:8162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8162
262
reference_url https://access.redhat.com/errata/RHSA-2024:9401
reference_id RHSA-2024:9401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9401
263
reference_url https://usn.ubuntu.com/6797-1/
reference_id USN-6797-1
reference_type
scores
url https://usn.ubuntu.com/6797-1/
264
reference_url https://xenbits.xen.org/xsa/advisory-452.html
reference_id XSA-452
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-452.html
265
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
reference_id ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-28746, XSA-452
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy
28
url VCID-psaa-jdr7-e3fm
vulnerability_id VCID-psaa-jdr7-e3fm
summary libxl leaks data to PVH guests via ACPI tables
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45819
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19749
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19801
published_at 2026-04-04T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.2249
published_at 2026-04-29T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22656
published_at 2026-04-21T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22499
published_at 2026-04-24T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22491
published_at 2026-04-26T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22638
published_at 2026-04-07T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22713
published_at 2026-04-08T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22764
published_at 2026-04-09T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22786
published_at 2026-04-11T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22747
published_at 2026-04-12T12:55:00Z
11
value 0.00076
scoring_system epss
scoring_elements 0.2269
published_at 2026-04-13T12:55:00Z
12
value 0.00076
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-16T12:55:00Z
13
value 0.00076
scoring_system epss
scoring_elements 0.22703
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45819
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-464.html
reference_id advisory-464.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:56:31Z/
url https://xenbits.xenproject.org/xsa/advisory-464.html
4
reference_url https://xenbits.xen.org/xsa/advisory-464.html
reference_id XSA-464
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-464.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-45819, XSA-464
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psaa-jdr7-e3fm
29
url VCID-q3p3-tgay-6kcs
vulnerability_id VCID-q3p3-tgay-6kcs
summary Linux disk/nic frontends data leaks
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33740
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06503
published_at 2026-04-24T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06314
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06347
published_at 2026-04-04T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06327
published_at 2026-04-07T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06375
published_at 2026-04-08T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06417
published_at 2026-04-09T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06409
published_at 2026-04-11T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06403
published_at 2026-04-12T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06393
published_at 2026-04-13T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06332
published_at 2026-04-16T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06343
published_at 2026-04-18T12:55:00Z
11
value 0.00024
scoring_system epss
scoring_elements 0.06491
published_at 2026-04-21T12:55:00Z
12
value 0.00032
scoring_system epss
scoring_elements 0.09205
published_at 2026-04-29T12:55:00Z
13
value 0.00032
scoring_system epss
scoring_elements 0.09232
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33740
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://usn.ubuntu.com/5572-1/
reference_id USN-5572-1
reference_type
scores
url https://usn.ubuntu.com/5572-1/
12
reference_url https://usn.ubuntu.com/5572-2/
reference_id USN-5572-2
reference_type
scores
url https://usn.ubuntu.com/5572-2/
13
reference_url https://usn.ubuntu.com/5579-1/
reference_id USN-5579-1
reference_type
scores
url https://usn.ubuntu.com/5579-1/
14
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
15
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
16
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
17
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
18
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
19
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
20
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
21
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
22
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
23
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
24
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
25
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
26
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
27
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
28
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
29
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
30
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
31
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
32
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
33
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
34
reference_url https://xenbits.xen.org/xsa/advisory-403.html
reference_id XSA-403
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-403.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2022-33740
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3p3-tgay-6kcs
30
url VCID-qsma-2ufh-jybe
vulnerability_id VCID-qsma-2ufh-jybe
summary Xenstored DoS by unprivileged domain
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-23555
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03282
published_at 2026-04-16T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03345
published_at 2026-04-02T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03408
published_at 2026-04-21T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03292
published_at 2026-04-18T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03357
published_at 2026-04-04T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03372
published_at 2026-04-07T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.03377
published_at 2026-04-08T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.03397
published_at 2026-04-09T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.03355
published_at 2026-04-11T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.03327
published_at 2026-04-12T12:55:00Z
10
value 0.00015
scoring_system epss
scoring_elements 0.03306
published_at 2026-04-13T12:55:00Z
11
value 0.00017
scoring_system epss
scoring_elements 0.04132
published_at 2026-04-29T12:55:00Z
12
value 0.00017
scoring_system epss
scoring_elements 0.0408
published_at 2026-04-24T12:55:00Z
13
value 0.00017
scoring_system epss
scoring_elements 0.04099
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-23555
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-481.html
reference_id advisory-481.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-23T14:11:41Z/
url https://xenbits.xenproject.org/xsa/advisory-481.html
4
reference_url https://xenbits.xen.org/xsa/advisory-481.html
reference_id XSA-481
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-481.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2026-23555, XSA-481
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qsma-2ufh-jybe
31
url VCID-rdub-9bhg-nbc6
vulnerability_id VCID-rdub-9bhg-nbc6
summary x86: Deadlock in vlapic_error()
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45817
reference_id
reference_type
scores
0
value 0.00501
scoring_system epss
scoring_elements 0.66056
published_at 2026-04-29T12:55:00Z
1
value 0.00501
scoring_system epss
scoring_elements 0.66026
published_at 2026-04-21T12:55:00Z
2
value 0.00501
scoring_system epss
scoring_elements 0.66046
published_at 2026-04-24T12:55:00Z
3
value 0.00501
scoring_system epss
scoring_elements 0.66057
published_at 2026-04-26T12:55:00Z
4
value 0.00501
scoring_system epss
scoring_elements 0.65955
published_at 2026-04-02T12:55:00Z
5
value 0.00501
scoring_system epss
scoring_elements 0.65985
published_at 2026-04-04T12:55:00Z
6
value 0.00501
scoring_system epss
scoring_elements 0.6595
published_at 2026-04-07T12:55:00Z
7
value 0.00501
scoring_system epss
scoring_elements 0.66002
published_at 2026-04-08T12:55:00Z
8
value 0.00501
scoring_system epss
scoring_elements 0.66014
published_at 2026-04-09T12:55:00Z
9
value 0.00501
scoring_system epss
scoring_elements 0.66033
published_at 2026-04-11T12:55:00Z
10
value 0.00501
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-12T12:55:00Z
11
value 0.00501
scoring_system epss
scoring_elements 0.65989
published_at 2026-04-13T12:55:00Z
12
value 0.00501
scoring_system epss
scoring_elements 0.66025
published_at 2026-04-16T12:55:00Z
13
value 0.00501
scoring_system epss
scoring_elements 0.66039
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45817
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-462.html
reference_id advisory-462.html
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T13:35:45Z/
url https://xenbits.xenproject.org/xsa/advisory-462.html
4
reference_url https://xenbits.xen.org/xsa/advisory-462.html
reference_id XSA-462
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-462.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-45817, XSA-462
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rdub-9bhg-nbc6
32
url VCID-rk2f-yqbb-nyd2
vulnerability_id VCID-rk2f-yqbb-nyd2
summary arm32: The cache may not be properly cleaned/invalidated (take two)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46837
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.23587
published_at 2026-04-29T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23782
published_at 2026-04-16T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.2377
published_at 2026-04-18T12:55:00Z
3
value 0.00081
scoring_system epss
scoring_elements 0.23749
published_at 2026-04-21T12:55:00Z
4
value 0.00081
scoring_system epss
scoring_elements 0.23633
published_at 2026-04-24T12:55:00Z
5
value 0.00081
scoring_system epss
scoring_elements 0.23622
published_at 2026-04-26T12:55:00Z
6
value 0.00081
scoring_system epss
scoring_elements 0.2391
published_at 2026-04-02T12:55:00Z
7
value 0.00081
scoring_system epss
scoring_elements 0.23951
published_at 2026-04-04T12:55:00Z
8
value 0.00081
scoring_system epss
scoring_elements 0.2374
published_at 2026-04-07T12:55:00Z
9
value 0.00081
scoring_system epss
scoring_elements 0.2381
published_at 2026-04-08T12:55:00Z
10
value 0.00081
scoring_system epss
scoring_elements 0.23857
published_at 2026-04-09T12:55:00Z
11
value 0.00081
scoring_system epss
scoring_elements 0.23872
published_at 2026-04-11T12:55:00Z
12
value 0.00081
scoring_system epss
scoring_elements 0.23827
published_at 2026-04-12T12:55:00Z
13
value 0.00081
scoring_system epss
scoring_elements 0.23771
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46837
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837
2
reference_url https://xenbits.xenproject.org/xsa/advisory-447.html
reference_id advisory-447.html
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/
url https://xenbits.xenproject.org/xsa/advisory-447.html
3
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/
reference_id JFVKWYQFRUU3CAS53THTUKXEOUDWI42G
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/
reference_id XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/
6
reference_url https://xenbits.xen.org/xsa/advisory-447.html
reference_id XSA-447
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-447.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-46837, XSA-447
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rk2f-yqbb-nyd2
33
url VCID-rt5n-e4wq-p3gh
vulnerability_id VCID-rt5n-e4wq-p3gh
summary x86 HVM hypercalls may trigger Xen bug check
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46842
reference_id
reference_type
scores
0
value 0.02093
scoring_system epss
scoring_elements 0.84099
published_at 2026-04-29T12:55:00Z
1
value 0.02093
scoring_system epss
scoring_elements 0.83982
published_at 2026-04-02T12:55:00Z
2
value 0.02093
scoring_system epss
scoring_elements 0.84062
published_at 2026-04-21T12:55:00Z
3
value 0.02093
scoring_system epss
scoring_elements 0.84088
published_at 2026-04-24T12:55:00Z
4
value 0.02093
scoring_system epss
scoring_elements 0.84094
published_at 2026-04-26T12:55:00Z
5
value 0.02093
scoring_system epss
scoring_elements 0.83997
published_at 2026-04-04T12:55:00Z
6
value 0.02093
scoring_system epss
scoring_elements 0.84
published_at 2026-04-07T12:55:00Z
7
value 0.02093
scoring_system epss
scoring_elements 0.84023
published_at 2026-04-08T12:55:00Z
8
value 0.02093
scoring_system epss
scoring_elements 0.8403
published_at 2026-04-09T12:55:00Z
9
value 0.02093
scoring_system epss
scoring_elements 0.84047
published_at 2026-04-11T12:55:00Z
10
value 0.02093
scoring_system epss
scoring_elements 0.8404
published_at 2026-04-12T12:55:00Z
11
value 0.02093
scoring_system epss
scoring_elements 0.84035
published_at 2026-04-13T12:55:00Z
12
value 0.02093
scoring_system epss
scoring_elements 0.84058
published_at 2026-04-16T12:55:00Z
13
value 0.02093
scoring_system epss
scoring_elements 0.84061
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46842
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-454.html
reference_id advisory-454.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T18:23:20Z/
url https://xenbits.xenproject.org/xsa/advisory-454.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-454.html
reference_id XSA-454
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-454.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-46842, XSA-454
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rt5n-e4wq-p3gh
34
url VCID-tjgh-waa3-wqgk
vulnerability_id VCID-tjgh-waa3-wqgk
summary Arm issues with page refcounting
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58144
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.18107
published_at 2026-04-04T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18052
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18162
published_at 2026-04-29T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18288
published_at 2026-04-18T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18313
published_at 2026-04-21T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18215
published_at 2026-04-24T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.182
published_at 2026-04-26T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19249
published_at 2026-04-11T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19202
published_at 2026-04-12T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19147
published_at 2026-04-13T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.19106
published_at 2026-04-16T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.1919
published_at 2026-04-08T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.19243
published_at 2026-04-09T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.19111
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58144
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
3
reference_url https://xenbits.xenproject.org/xsa/advisory-473.html
reference_id advisory-473.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:18:50Z/
url https://xenbits.xenproject.org/xsa/advisory-473.html
4
reference_url https://xenbits.xen.org/xsa/advisory-473.html
reference_id XSA-473
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-473.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58144, XSA-473
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjgh-waa3-wqgk
35
url VCID-uv8m-bj4c-8fes
vulnerability_id VCID-uv8m-bj4c-8fes
summary x86: Transitive Scheduler Attacks
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-36357
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08597
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09825
published_at 2026-04-11T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09765
published_at 2026-04-08T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09815
published_at 2026-04-09T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09793
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09776
published_at 2026-04-13T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09661
published_at 2026-04-16T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09633
published_at 2026-04-18T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09798
published_at 2026-04-04T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09694
published_at 2026-04-07T12:55:00Z
10
value 0.00036
scoring_system epss
scoring_elements 0.10825
published_at 2026-04-21T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10849
published_at 2026-04-24T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10808
published_at 2026-04-26T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10748
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-36357
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035
reference_id 1109035
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2350726
reference_id 2350726
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2350726
5
reference_url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html
reference_id amd-sb-7029.html
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:36:59Z/
url https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html
6
reference_url https://access.redhat.com/errata/RHSA-2025:19930
reference_id RHSA-2025:19930
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19930
7
reference_url https://access.redhat.com/errata/RHSA-2025:20095
reference_id RHSA-2025:20095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20095
8
reference_url https://access.redhat.com/errata/RHSA-2025:20518
reference_id RHSA-2025:20518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20518
9
reference_url https://usn.ubuntu.com/7833-1/
reference_id USN-7833-1
reference_type
scores
url https://usn.ubuntu.com/7833-1/
10
reference_url https://usn.ubuntu.com/7833-2/
reference_id USN-7833-2
reference_type
scores
url https://usn.ubuntu.com/7833-2/
11
reference_url https://usn.ubuntu.com/7833-3/
reference_id USN-7833-3
reference_type
scores
url https://usn.ubuntu.com/7833-3/
12
reference_url https://usn.ubuntu.com/7833-4/
reference_id USN-7833-4
reference_type
scores
url https://usn.ubuntu.com/7833-4/
13
reference_url https://usn.ubuntu.com/7834-1/
reference_id USN-7834-1
reference_type
scores
url https://usn.ubuntu.com/7834-1/
14
reference_url https://usn.ubuntu.com/7848-1/
reference_id USN-7848-1
reference_type
scores
url https://usn.ubuntu.com/7848-1/
15
reference_url https://usn.ubuntu.com/7856-1/
reference_id USN-7856-1
reference_type
scores
url https://usn.ubuntu.com/7856-1/
16
reference_url https://usn.ubuntu.com/8028-1/
reference_id USN-8028-1
reference_type
scores
url https://usn.ubuntu.com/8028-1/
17
reference_url https://usn.ubuntu.com/8028-2/
reference_id USN-8028-2
reference_type
scores
url https://usn.ubuntu.com/8028-2/
18
reference_url https://usn.ubuntu.com/8028-3/
reference_id USN-8028-3
reference_type
scores
url https://usn.ubuntu.com/8028-3/
19
reference_url https://usn.ubuntu.com/8028-4/
reference_id USN-8028-4
reference_type
scores
url https://usn.ubuntu.com/8028-4/
20
reference_url https://usn.ubuntu.com/8028-5/
reference_id USN-8028-5
reference_type
scores
url https://usn.ubuntu.com/8028-5/
21
reference_url https://usn.ubuntu.com/8028-6/
reference_id USN-8028-6
reference_type
scores
url https://usn.ubuntu.com/8028-6/
22
reference_url https://usn.ubuntu.com/8028-7/
reference_id USN-8028-7
reference_type
scores
url https://usn.ubuntu.com/8028-7/
23
reference_url https://usn.ubuntu.com/8028-8/
reference_id USN-8028-8
reference_type
scores
url https://usn.ubuntu.com/8028-8/
24
reference_url https://usn.ubuntu.com/8031-1/
reference_id USN-8031-1
reference_type
scores
url https://usn.ubuntu.com/8031-1/
25
reference_url https://usn.ubuntu.com/8031-2/
reference_id USN-8031-2
reference_type
scores
url https://usn.ubuntu.com/8031-2/
26
reference_url https://usn.ubuntu.com/8031-3/
reference_id USN-8031-3
reference_type
scores
url https://usn.ubuntu.com/8031-3/
27
reference_url https://usn.ubuntu.com/8052-1/
reference_id USN-8052-1
reference_type
scores
url https://usn.ubuntu.com/8052-1/
28
reference_url https://usn.ubuntu.com/8052-2/
reference_id USN-8052-2
reference_type
scores
url https://usn.ubuntu.com/8052-2/
29
reference_url https://usn.ubuntu.com/8074-1/
reference_id USN-8074-1
reference_type
scores
url https://usn.ubuntu.com/8074-1/
30
reference_url https://usn.ubuntu.com/8074-2/
reference_id USN-8074-2
reference_type
scores
url https://usn.ubuntu.com/8074-2/
31
reference_url https://usn.ubuntu.com/8126-1/
reference_id USN-8126-1
reference_type
scores
url https://usn.ubuntu.com/8126-1/
32
reference_url https://xenbits.xen.org/xsa/advisory-471.html
reference_id XSA-471
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-471.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-36357, XSA-471
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uv8m-bj4c-8fes
36
url VCID-vv23-mvyn-87hg
vulnerability_id VCID-vv23-mvyn-87hg
summary Mutiple vulnerabilities in the Viridian interface
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58143
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14661
published_at 2026-04-02T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14732
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15748
published_at 2026-04-21T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15762
published_at 2026-04-26T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.1572
published_at 2026-04-29T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15702
published_at 2026-04-18T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15764
published_at 2026-04-24T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.16805
published_at 2026-04-11T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.16688
published_at 2026-04-07T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16773
published_at 2026-04-08T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16827
published_at 2026-04-09T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16761
published_at 2026-04-12T12:55:00Z
12
value 0.00053
scoring_system epss
scoring_elements 0.16703
published_at 2026-04-13T12:55:00Z
13
value 0.00053
scoring_system epss
scoring_elements 0.16641
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58143
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-472.html
reference_id advisory-472.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:21:09Z/
url https://xenbits.xenproject.org/xsa/advisory-472.html
5
reference_url https://xenbits.xen.org/xsa/advisory-472.html
reference_id XSA-472
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-472.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58143
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vv23-mvyn-87hg
37
url VCID-wd4s-jxuf-skbp
vulnerability_id VCID-wd4s-jxuf-skbp
summary x86/AMD: mismatch in IOMMU quarantine page table levels
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46835
reference_id
reference_type
scores
0
value 0.00087
scoring_system epss
scoring_elements 0.24807
published_at 2026-04-29T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25096
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.2492
published_at 2026-04-21T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24863
published_at 2026-04-24T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24851
published_at 2026-04-26T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-04T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24909
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24977
published_at 2026-04-08T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.25022
published_at 2026-04-09T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.25036
published_at 2026-04-11T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24996
published_at 2026-04-12T12:55:00Z
11
value 0.00087
scoring_system epss
scoring_elements 0.24941
published_at 2026-04-13T12:55:00Z
12
value 0.00087
scoring_system epss
scoring_elements 0.24955
published_at 2026-04-16T12:55:00Z
13
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46835
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
reference_id 1056928
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928
4
reference_url https://xenbits.xenproject.org/xsa/advisory-445.html
reference_id advisory-445.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-12T04:00:28Z/
url https://xenbits.xenproject.org/xsa/advisory-445.html
5
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
6
reference_url https://xenbits.xen.org/xsa/advisory-445.html
reference_id XSA-445
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-445.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-46835, XSA-445
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wd4s-jxuf-skbp
38
url VCID-wz1m-aeaf-nkg7
vulnerability_id VCID-wz1m-aeaf-nkg7
summary Mutiple vulnerabilities in the Viridian interface
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58142
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.0691
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.0696
published_at 2026-04-04T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07717
published_at 2026-04-21T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07643
published_at 2026-04-26T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07611
published_at 2026-04-29T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07576
published_at 2026-04-18T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07665
published_at 2026-04-24T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08147
published_at 2026-04-11T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08071
published_at 2026-04-07T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08132
published_at 2026-04-08T12:55:00Z
10
value 0.00029
scoring_system epss
scoring_elements 0.08154
published_at 2026-04-09T12:55:00Z
11
value 0.00029
scoring_system epss
scoring_elements 0.08127
published_at 2026-04-12T12:55:00Z
12
value 0.00029
scoring_system epss
scoring_elements 0.0811
published_at 2026-04-13T12:55:00Z
13
value 0.00029
scoring_system epss
scoring_elements 0.08017
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58142
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-472.html
reference_id advisory-472.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:24:28Z/
url https://xenbits.xenproject.org/xsa/advisory-472.html
5
reference_url https://xenbits.xen.org/xsa/advisory-472.html
reference_id XSA-472
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-472.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-58142, XSA-472
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wz1m-aeaf-nkg7
39
url VCID-xqpz-y83m-4uc4
vulnerability_id VCID-xqpz-y83m-4uc4
summary x86: Incorrect stubs exception handling for flags recovery
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27465
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.23924
published_at 2026-04-07T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24105
published_at 2026-04-02T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24037
published_at 2026-04-09T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.2399
published_at 2026-04-08T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24143
published_at 2026-04-04T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25463
published_at 2026-04-29T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.25569
published_at 2026-04-21T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25519
published_at 2026-04-24T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25511
published_at 2026-04-26T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25711
published_at 2026-04-11T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-12T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25612
published_at 2026-04-13T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25613
published_at 2026-04-16T12:55:00Z
13
value 0.00091
scoring_system epss
scoring_elements 0.25598
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27465
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
reference_id 1120075
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075
4
reference_url https://xenbits.xenproject.org/xsa/advisory-470.html
reference_id advisory-470.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T20:46:06Z/
url https://xenbits.xenproject.org/xsa/advisory-470.html
5
reference_url https://xenbits.xen.org/xsa/advisory-470.html
reference_id XSA-470
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-470.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2025-27465, XSA-470
risk_score 1.8
exploitability 0.5
weighted_severity 3.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqpz-y83m-4uc4
40
url VCID-ye1t-qhtx-sucm
vulnerability_id VCID-ye1t-qhtx-sucm
summary x86/AMD: missing IOMMU TLB flushing
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-34326
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.27848
published_at 2026-04-29T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28325
published_at 2026-04-02T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.2812
published_at 2026-04-21T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28037
published_at 2026-04-24T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.27924
published_at 2026-04-26T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28368
published_at 2026-04-04T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28158
published_at 2026-04-07T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28224
published_at 2026-04-08T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28266
published_at 2026-04-09T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28271
published_at 2026-04-11T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28228
published_at 2026-04-12T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.28169
published_at 2026-04-13T12:55:00Z
12
value 0.00103
scoring_system epss
scoring_elements 0.28183
published_at 2026-04-16T12:55:00Z
13
value 0.00103
scoring_system epss
scoring_elements 0.28165
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-34326
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-442.html
reference_id advisory-442.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T20:27:29Z/
url https://xenbits.xenproject.org/xsa/advisory-442.html
4
reference_url https://xenbits.xen.org/xsa/advisory-442.html
reference_id XSA-442
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-442.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2023-34326, XSA-442
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ye1t-qhtx-sucm
41
url VCID-z9rm-9p2q-wfag
vulnerability_id VCID-z9rm-9p2q-wfag
summary x86: Incorrect logic for BTC/SRSO mitigations
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-31142
reference_id
reference_type
scores
0
value 0.03118
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-29T12:55:00Z
1
value 0.03118
scoring_system epss
scoring_elements 0.86856
published_at 2026-04-21T12:55:00Z
2
value 0.03118
scoring_system epss
scoring_elements 0.86872
published_at 2026-04-24T12:55:00Z
3
value 0.03118
scoring_system epss
scoring_elements 0.86879
published_at 2026-04-26T12:55:00Z
4
value 0.03118
scoring_system epss
scoring_elements 0.86789
published_at 2026-04-02T12:55:00Z
5
value 0.03118
scoring_system epss
scoring_elements 0.86808
published_at 2026-04-04T12:55:00Z
6
value 0.03118
scoring_system epss
scoring_elements 0.86802
published_at 2026-04-07T12:55:00Z
7
value 0.03118
scoring_system epss
scoring_elements 0.86821
published_at 2026-04-08T12:55:00Z
8
value 0.03118
scoring_system epss
scoring_elements 0.8683
published_at 2026-04-09T12:55:00Z
9
value 0.03118
scoring_system epss
scoring_elements 0.86843
published_at 2026-04-11T12:55:00Z
10
value 0.03118
scoring_system epss
scoring_elements 0.86839
published_at 2026-04-12T12:55:00Z
11
value 0.03118
scoring_system epss
scoring_elements 0.86835
published_at 2026-04-13T12:55:00Z
12
value 0.03118
scoring_system epss
scoring_elements 0.86852
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-31142
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://xenbits.xenproject.org/xsa/advisory-455.html
reference_id advisory-455.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T13:51:28Z/
url https://xenbits.xenproject.org/xsa/advisory-455.html
4
reference_url https://security.gentoo.org/glsa/202409-10
reference_id GLSA-202409-10
reference_type
scores
url https://security.gentoo.org/glsa/202409-10
5
reference_url https://xenbits.xen.org/xsa/advisory-455.html
reference_id XSA-455
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-455.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2024-31142, XSA-455
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z9rm-9p2q-wfag
42
url VCID-zkeg-d5d5-vbda
vulnerability_id VCID-zkeg-d5d5-vbda
summary Linux disk/nic frontends data leaks
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-33742
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06317
published_at 2026-04-24T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06103
published_at 2026-04-02T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06133
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06117
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0616
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06197
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06188
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06183
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06175
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06134
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06146
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.06299
published_at 2026-04-21T12:55:00Z
12
value 0.00031
scoring_system epss
scoring_elements 0.08915
published_at 2026-04-29T12:55:00Z
13
value 0.00031
scoring_system epss
scoring_elements 0.08931
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-33742
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://usn.ubuntu.com/5623-1/
reference_id USN-5623-1
reference_type
scores
url https://usn.ubuntu.com/5623-1/
12
reference_url https://usn.ubuntu.com/5624-1/
reference_id USN-5624-1
reference_type
scores
url https://usn.ubuntu.com/5624-1/
13
reference_url https://usn.ubuntu.com/5633-1/
reference_id USN-5633-1
reference_type
scores
url https://usn.ubuntu.com/5633-1/
14
reference_url https://usn.ubuntu.com/5635-1/
reference_id USN-5635-1
reference_type
scores
url https://usn.ubuntu.com/5635-1/
15
reference_url https://usn.ubuntu.com/5640-1/
reference_id USN-5640-1
reference_type
scores
url https://usn.ubuntu.com/5640-1/
16
reference_url https://usn.ubuntu.com/5644-1/
reference_id USN-5644-1
reference_type
scores
url https://usn.ubuntu.com/5644-1/
17
reference_url https://usn.ubuntu.com/5648-1/
reference_id USN-5648-1
reference_type
scores
url https://usn.ubuntu.com/5648-1/
18
reference_url https://usn.ubuntu.com/5655-1/
reference_id USN-5655-1
reference_type
scores
url https://usn.ubuntu.com/5655-1/
19
reference_url https://usn.ubuntu.com/5668-1/
reference_id USN-5668-1
reference_type
scores
url https://usn.ubuntu.com/5668-1/
20
reference_url https://usn.ubuntu.com/5669-1/
reference_id USN-5669-1
reference_type
scores
url https://usn.ubuntu.com/5669-1/
21
reference_url https://usn.ubuntu.com/5669-2/
reference_id USN-5669-2
reference_type
scores
url https://usn.ubuntu.com/5669-2/
22
reference_url https://usn.ubuntu.com/5677-1/
reference_id USN-5677-1
reference_type
scores
url https://usn.ubuntu.com/5677-1/
23
reference_url https://usn.ubuntu.com/5678-1/
reference_id USN-5678-1
reference_type
scores
url https://usn.ubuntu.com/5678-1/
24
reference_url https://usn.ubuntu.com/5679-1/
reference_id USN-5679-1
reference_type
scores
url https://usn.ubuntu.com/5679-1/
25
reference_url https://usn.ubuntu.com/5682-1/
reference_id USN-5682-1
reference_type
scores
url https://usn.ubuntu.com/5682-1/
26
reference_url https://usn.ubuntu.com/5683-1/
reference_id USN-5683-1
reference_type
scores
url https://usn.ubuntu.com/5683-1/
27
reference_url https://usn.ubuntu.com/5684-1/
reference_id USN-5684-1
reference_type
scores
url https://usn.ubuntu.com/5684-1/
28
reference_url https://usn.ubuntu.com/5687-1/
reference_id USN-5687-1
reference_type
scores
url https://usn.ubuntu.com/5687-1/
29
reference_url https://usn.ubuntu.com/5695-1/
reference_id USN-5695-1
reference_type
scores
url https://usn.ubuntu.com/5695-1/
30
reference_url https://usn.ubuntu.com/5706-1/
reference_id USN-5706-1
reference_type
scores
url https://usn.ubuntu.com/5706-1/
31
reference_url https://xenbits.xen.org/xsa/advisory-403.html
reference_id XSA-403
reference_type
scores
url https://xenbits.xen.org/xsa/advisory-403.html
fixed_packages
0
url pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
purl pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qpfc-3296-9ub3
1
vulnerability VCID-upju-tcz7-efg1
2
vulnerability VCID-wx6w-6y5m-fugn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1
aliases CVE-2022-33742
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zkeg-d5d5-vbda
Risk_score2.2
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1