Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/994413?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "type": "deb", "namespace": "debian", "name": "xen", "version": "4.17.5+72-g01140da4e8-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4410?format=api", "vulnerability_id": "VCID-qpfc-3296-9ub3", "summary": "x86: incomplete IBPB for vCPU isolation", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07141", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07522", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07629", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07553", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07526", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.0759", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07577", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.075", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07488", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23553" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-479.html", "reference_id": "advisory-479.html", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T16:40:38Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-479.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-479.html", "reference_id": "XSA-479", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-479.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1054735?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1" } ], "aliases": [ "CVE-2026-23553", "XSA-479" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfc-3296-9ub3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4408?format=api", "vulnerability_id": "VCID-upju-tcz7-efg1", "summary": "x86: buffer overrun with shadow paging + tracing", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.02981", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0432", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0434", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04198", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04168", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04177", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58150" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-477.html", "reference_id": "advisory-477.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T16:44:38Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-477.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-477.html", "reference_id": "XSA-477", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-477.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1054735?format=api", "purl": "pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qsma-2ufh-jybe" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1" } ], "aliases": [ "CVE-2025-58150", "XSA-477" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upju-tcz7-efg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4411?format=api", "vulnerability_id": "VCID-wx6w-6y5m-fugn", "summary": "Use after free of paging structures in EPT", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01698", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01607", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01629", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01606", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02541", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02489", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02477", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23554" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-480.html", "reference_id": "advisory-480.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-23T14:18:54Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-480.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-480.html", "reference_id": "XSA-480", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-480.html" } ], "fixed_packages": [], "aliases": [ "CVE-2026-23554", "XSA-480" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wx6w-6y5m-fugn" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4380?format=api", "vulnerability_id": "VCID-1tb8-t91c-63bp", "summary": "x86: Native Branch History Injection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08738", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.0878", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08735", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09191", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09057", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09077", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09195", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09224", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09194", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/04/09/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/04/09/15" }, { "reference_url": "https://www.kb.cert.org/vuls/id/155143", "reference_id": "155143", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://www.kb.cert.org/vuls/id/155143" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268118", "reference_id": "2268118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268118" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/", "reference_id": "6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QKNCPX7CJUK4I6BRGABAUQK2DMQZUCA/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/07/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/07/7" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-456.html", "reference_id": "advisory-456.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-456.html" }, { "reference_url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm", "reference_id": "branch-history-injection.htm", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/branch-history-injection.htm" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/", "reference_id": "D5OK6MH75S7YWD34EWW7QIZTS627RIE3", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5OK6MH75S7YWD34EWW7QIZTS627RIE3/" }, { "reference_url": "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file", "reference_id": "inspectre-gadget?tab=readme-ov-file", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://github.com/vusec/inspectre-gadget?tab=readme-ov-file" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102", "reference_id": "RHSA-2024:5102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6994", "reference_id": "RHSA-2024:6994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6995", "reference_id": "RHSA-2024:6995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8613", "reference_id": "RHSA-2024:8613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8614", "reference_id": "RHSA-2024:8614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8617", "reference_id": "RHSA-2024:8617", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8617" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/", "reference_id": "RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:51:54Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RYAZ7P6YFJ2E3FHKAGIKHWS46KYMMTZH/" }, { "reference_url": "https://usn.ubuntu.com/6766-1/", "reference_id": "USN-6766-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6766-1/" }, { "reference_url": "https://usn.ubuntu.com/6766-2/", "reference_id": "USN-6766-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6766-2/" }, { "reference_url": "https://usn.ubuntu.com/6766-3/", "reference_id": "USN-6766-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6766-3/" }, { "reference_url": "https://usn.ubuntu.com/6774-1/", "reference_id": "USN-6774-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6774-1/" }, { "reference_url": "https://usn.ubuntu.com/6795-1/", "reference_id": "USN-6795-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6795-1/" }, { "reference_url": "https://usn.ubuntu.com/6828-1/", "reference_id": "USN-6828-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6828-1/" }, { "reference_url": "https://usn.ubuntu.com/6865-1/", "reference_id": "USN-6865-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6865-1/" }, { "reference_url": "https://usn.ubuntu.com/6866-1/", "reference_id": "USN-6866-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6866-1/" }, { "reference_url": "https://usn.ubuntu.com/6866-2/", "reference_id": "USN-6866-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6866-2/" }, { "reference_url": "https://usn.ubuntu.com/6866-3/", "reference_id": "USN-6866-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6866-3/" }, { "reference_url": "https://usn.ubuntu.com/6868-1/", "reference_id": "USN-6868-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6868-1/" }, { "reference_url": "https://usn.ubuntu.com/6868-2/", "reference_id": "USN-6868-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6868-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-456.html", "reference_id": "XSA-456", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-456.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-2201", "XSA-456" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tb8-t91c-63bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4405?format=api", "vulnerability_id": "VCID-26a9-9zz3-wfhh", "summary": "x86: Incorrect input sanitisation in Viridian hypercalls", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06221", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07718", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07807", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07654", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58147" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-475.html", "reference_id": "advisory-475.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-31T17:45:24Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-475.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-475.html", "reference_id": "XSA-475", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-475.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58147", "XSA-475" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26a9-9zz3-wfhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4399?format=api", "vulnerability_id": "VCID-2trm-w3ww-cfhk", "summary": "Mutiple vulnerabilities in the Viridian interface", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07643", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07611", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08147", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08071", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0811", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08017", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27466" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-472.html", "reference_id": "advisory-472.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:25:53Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-472.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-472.html", "reference_id": "XSA-472", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-472.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-27466" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2trm-w3ww-cfhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4359?format=api", "vulnerability_id": "VCID-3bw4-631f-e7h6", "summary": "arm32: The cache may not be properly cleaned/invalidated", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34321", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17092", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17151", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17232", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17324", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17383", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17395", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17345", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17287", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17226", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17171", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34321" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34321" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954", "reference_id": "1051954", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051954" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-437.html", "reference_id": "advisory-437.html", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T15:52:01Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-437.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-437.html", "reference_id": "XSA-437", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-437.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34321", "XSA-437" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bw4-631f-e7h6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4382?format=api", "vulnerability_id": "VCID-3se4-qv6j-xqfq", "summary": "double unlock in x86 guest IRQ handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68631", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68594", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68621", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68626", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.6849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68558", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00568", "scoring_system": "epss", "scoring_elements": "0.68572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71439", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00676", "scoring_system": "epss", "scoring_elements": "0.71456", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31143" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-458.html", "reference_id": "advisory-458.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-21T13:31:44Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-458.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-458.html", "reference_id": "XSA-458", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-458.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31143", "XSA-458" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3se4-qv6j-xqfq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4375?format=api", "vulnerability_id": "VCID-3vdg-5g64-wkbt", "summary": "x86: shadow stack vs exceptions from emulation stubs", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19893", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20041", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19928", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19923", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.19999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20079", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20162", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20117", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20059", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46841" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-451.html", "reference_id": "advisory-451.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-451.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-451.html", "reference_id": "XSA-451", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-451.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/", "reference_id": "ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-25T16:09:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46841", "XSA-451" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vdg-5g64-wkbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4314?format=api", "vulnerability_id": "VCID-46ad-1k9n-j3hm", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05398", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07741", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414", "reference_id": "1014414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014414" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://usn.ubuntu.com/5773-1/", "reference_id": "USN-5773-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5773-1/" }, { "reference_url": "https://usn.ubuntu.com/5789-1/", "reference_id": "USN-5789-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5789-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-26365" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46ad-1k9n-j3hm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4316?format=api", "vulnerability_id": "VCID-4cdt-ycjx-6ub4", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05607", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05438", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05447", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05398", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05406", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05575", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07741", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-33741", "XSA-403" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4cdt-ycjx-6ub4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4387?format=api", "vulnerability_id": "VCID-4k7p-3g95-n7dm", "summary": "Deadlock in x86 HVM standard VGA handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45818", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42152", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42306", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42239", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42234", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.4234", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42418", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42382", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42354", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42403", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00202", "scoring_system": "epss", "scoring_elements": "0.42378", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45818" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45818" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-463.html", "reference_id": "advisory-463.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:59:24Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-463.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-463.html", "reference_id": "XSA-463", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-463.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-45818", "XSA-463" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4k7p-3g95-n7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4407?format=api", "vulnerability_id": "VCID-4pra-prf3-1uff", "summary": "Incorrect removal of permissions on PCI device unplug", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58149", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11572", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11701", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17679", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17836", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17743", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1772", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1794", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17895", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17847", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17789", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17798", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58149" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58149" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-476.html", "reference_id": "advisory-476.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:24:29Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-476.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-476.html", "reference_id": "XSA-476", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-476.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58149", "XSA-476" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4pra-prf3-1uff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4373?format=api", "vulnerability_id": "VCID-4rmg-db7g-u3hs", "summary": "pci: phantom functions assigned to incorrect contexts", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46839.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46839", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4893", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48913", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48959", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49005", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49001", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48955", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48963", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48951", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46839" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270533", "reference_id": "2270533", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270533" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-449.html", "reference_id": "advisory-449.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T14:00:00Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-449.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-449.html", "reference_id": "XSA-449", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-449.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46839", "XSA-449" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4rmg-db7g-u3hs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4358?format=api", "vulnerability_id": "VCID-5ktg-bhh1-ubbz", "summary": "arm: Guests can trigger a deadlock on Cortex-A77", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34320", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28247", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28782", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28655", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28695", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28697", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28625", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.286", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28435", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28323", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34320" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34320" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-436.html", "reference_id": "XSA-436", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-436.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34320", "XSA-436" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ktg-bhh1-ubbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4391?format=api", "vulnerability_id": "VCID-5u88-jt28-cfb6", "summary": "deadlock potential with VT-d and legacy PCI device pass-through", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1713", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25699", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25643", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30582", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30976", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30943", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30784", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30665", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.31009", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.30964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00223", "scoring_system": "epss", "scoring_elements": "0.44946", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-1713" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1713" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-467.html", "reference_id": "advisory-467.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-17T14:17:20Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-467.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-467.html", "reference_id": "XSA-467", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-467.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-1713", "XSA-467" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5u88-jt28-cfb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4368?format=api", "vulnerability_id": "VCID-6dax-cddv-7bbs", "summary": "x86/AMD: Debug Mask handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34328", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29567", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29921", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29958", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29865", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29742", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29629", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34328" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34328" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-444.html", "reference_id": "XSA-444", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-444.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34328", "XSA-444" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dax-cddv-7bbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4367?format=api", "vulnerability_id": "VCID-6jqj-2qwn-8qd9", "summary": "x86/AMD: Debug Mask handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34327", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29567", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29998", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29742", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29629", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.2986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29921", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29958", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29865", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34327" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34327" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-444.html", "reference_id": "advisory-444.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:36:52Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-444.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-444.html", "reference_id": "XSA-444", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-444.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34327" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6jqj-2qwn-8qd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4365?format=api", "vulnerability_id": "VCID-8k1q-b2kj-w7hh", "summary": "Multiple vulnerabilities in libfsimage disk handling", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34325", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2128", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21449", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21301", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.213", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21671", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21426", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21562", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21535", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21475", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2148", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34325" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34325" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-443.html", "reference_id": "advisory-443.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-30T18:38:25Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-443.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-443.html", "reference_id": "XSA-443", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-443.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34325", "XSA-443" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k1q-b2kj-w7hh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4361?format=api", "vulnerability_id": "VCID-8tv5-zxmm-r3fk", "summary": "x86/AMD: Divide speculative information leak", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06701", "scoring_system": "epss", "scoring_elements": "0.91275", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06701", "scoring_system": "epss", "scoring_elements": "0.91286", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.06872", "scoring_system": "epss", "scoring_elements": "0.91406", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91965", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91933", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.9194", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.9196", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.9198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91967", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07781", "scoring_system": "epss", "scoring_elements": "0.91968", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2007" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34319" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/27/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/12", "reference_id": "12", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/13", "reference_id": "13", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/14", "reference_id": "14", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/2", "reference_id": "2", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230125", "reference_id": "2230125", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230125" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/04/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/25/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/26/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9" }, { "reference_url": "http://xenbits.xen.org/xsa/advisory-439.html", "reference_id": "advisory-439.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "http://xenbits.xen.org/xsa/advisory-439.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/", "reference_id": "AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/" }, { "reference_url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007", "reference_id": "AMD-SB-7007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/", "reference_id": "DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5480", "reference_id": "dsa-5480", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5480" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5492", "reference_id": "dsa-5492", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5492" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/", "reference_id": "KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240531-0005/", "reference_id": "ntap-20240531-0005", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-17T14:23:03Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240531-0005/" }, { "reference_url": "https://usn.ubuntu.com/6383-1/", "reference_id": "USN-6383-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6383-1/" }, { "reference_url": "https://usn.ubuntu.com/6384-1/", "reference_id": "USN-6384-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6384-1/" }, { "reference_url": "https://usn.ubuntu.com/6386-1/", "reference_id": "USN-6386-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-1/" }, { "reference_url": "https://usn.ubuntu.com/6386-2/", "reference_id": "USN-6386-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-2/" }, { "reference_url": "https://usn.ubuntu.com/6386-3/", "reference_id": "USN-6386-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6386-3/" }, { "reference_url": "https://usn.ubuntu.com/6387-1/", "reference_id": "USN-6387-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6387-1/" }, { "reference_url": "https://usn.ubuntu.com/6387-2/", "reference_id": "USN-6387-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6387-2/" }, { "reference_url": "https://usn.ubuntu.com/6466-1/", "reference_id": "USN-6466-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6466-1/" }, { "reference_url": "https://usn.ubuntu.com/6577-1/", "reference_id": "USN-6577-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6577-1/" }, { "reference_url": "https://usn.ubuntu.com/6602-1/", "reference_id": "USN-6602-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6602-1/" }, { "reference_url": "https://usn.ubuntu.com/6604-1/", "reference_id": "USN-6604-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6604-1/" }, { "reference_url": "https://usn.ubuntu.com/6604-2/", "reference_id": "USN-6604-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6604-2/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-439.html", "reference_id": "XSA-439", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-439.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-20588", "XSA-439" ], "risk_score": 2.7, "exploitability": "0.5", "weighted_severity": "5.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8tv5-zxmm-r3fk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4362?format=api", "vulnerability_id": "VCID-97zm-r9b6-uqdu", "summary": "xenstored: A transaction conflict can crash C Xenstored", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34323", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25175", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24929", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24917", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25216", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24987", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25055", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.251", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25114", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25074", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2502", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25021", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34323" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34323" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-440.html", "reference_id": "advisory-440.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-09T16:40:56Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-440.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-440.html", "reference_id": "XSA-440", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-440.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34323", "XSA-440" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-97zm-r9b6-uqdu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4360?format=api", "vulnerability_id": "VCID-b57c-x3pw-7fb7", "summary": "top-level shadow reference dropped too early for 64-bit PV guests", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34322", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18143", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18295", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18196", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1818", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18414", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18366", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18315", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18259", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18271", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34322" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34322" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-438.html", "reference_id": "advisory-438.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:50:09Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-438.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-438.html", "reference_id": "XSA-438", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-438.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34322", "XSA-438" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b57c-x3pw-7fb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4370?format=api", "vulnerability_id": "VCID-bhdk-jmss-4qc8", "summary": "x86: BTC/SRSO fixes not fully effective", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46836", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05862", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05783", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05815", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05852", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05645", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05674", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05668", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05623", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05635", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46836" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928", "reference_id": "1056928", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-446.html", "reference_id": "advisory-446.html", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:16:12Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-446.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-446.html", "reference_id": "XSA-446", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-446.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46836", "XSA-446" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bhdk-jmss-4qc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4377?format=api", "vulnerability_id": "VCID-byu1-7n9c-5fes", "summary": "GhostRace: Speculative Race Conditions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2193.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2193", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00889", "scoring_system": "epss", "scoring_elements": "0.75447", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75714", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75631", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75669", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75673", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75658", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75697", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00897", "scoring_system": "epss", "scoring_elements": "0.75702", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/12/14", "reference_id": "14", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/03/12/14" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262051", "reference_id": "2262051", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262051" }, { "reference_url": "https://kb.cert.org/vuls/id/488902", "reference_id": "488902", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://kb.cert.org/vuls/id/488902" }, { "reference_url": "https://www.kb.cert.org/vuls/id/488902", "reference_id": "488902", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://www.kb.cert.org/vuls/id/488902" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html", "reference_id": "amd-sb-7016.html", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/", "reference_id": "EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/" }, { "reference_url": "https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace", "reference_id": "ghostrace", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace" }, { "reference_url": "https://www.vusec.net/projects/ghostrace/", "reference_id": "ghostrace", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://www.vusec.net/projects/ghostrace/" }, { "reference_url": "https://download.vusec.net/papers/ghostrace_sec24.pdf", "reference_id": "ghostrace_sec24.pdf", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://download.vusec.net/papers/ghostrace_sec24.pdf" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/", "reference_id": "H63LGAQXPEVJOES73U4XK65I6DASOAAG", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/" }, { "reference_url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23", "reference_id": "?id=944d5fe50f3f03daacfea16300e656a1691c4a23", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-453.html", "reference_id": "XSA-453", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://xenbits.xen.org/xsa/advisory-453.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/", "reference_id": "ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T15:31:03Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-2193", "XSA-453" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byu1-7n9c-5fes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4403?format=api", "vulnerability_id": "VCID-c4xu-szkm-1kh6", "summary": "Arm issues with page refcounting", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13678", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13617", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13724", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13813", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13836", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13805", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14679", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14624", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14515", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14697", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14757", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14609", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58145" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-473.html", "reference_id": "advisory-473.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:39:37Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-473.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-473.html", "reference_id": "XSA-473", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-473.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58145" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4xu-szkm-1kh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4384?format=api", "vulnerability_id": "VCID-ee3z-24pr-kqcm", "summary": "error handling in x86 IOMMU identity mapping", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21966", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21953", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2215", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31145" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-460.html", "reference_id": "advisory-460.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:27:44Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-460.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-460.html", "reference_id": "XSA-460", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-460.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31145", "XSA-460" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee3z-24pr-kqcm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4395?format=api", "vulnerability_id": "VCID-ejhc-6yqt-gkgv", "summary": "x86: Indirect Target Selection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28956.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28956", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25696", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25764", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25806", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25706", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.4551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45557", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45419", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45368", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45505", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172", "reference_id": "1105172", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105172" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193", "reference_id": "1105193", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1105193" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366125", "reference_id": "2366125", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366125" }, { "reference_url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html", "reference_id": "intel-sa-01153.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "5.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:42:03Z/" } ], "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01153.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10101", "reference_id": "RHSA-2025:10101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10102", "reference_id": "RHSA-2025:10102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10103", "reference_id": "RHSA-2025:10103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10107", "reference_id": "RHSA-2025:10107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10108", "reference_id": "RHSA-2025:10108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10109", "reference_id": "RHSA-2025:10109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10111", "reference_id": "RHSA-2025:10111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10126", "reference_id": "RHSA-2025:10126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10162", "reference_id": "RHSA-2025:10162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10991", "reference_id": "RHSA-2025:10991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13962", "reference_id": "RHSA-2025:13962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19962", "reference_id": "RHSA-2025:19962", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19962" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://usn.ubuntu.com/7535-1/", "reference_id": "USN-7535-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7535-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-469.html", "reference_id": "XSA-469", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-469.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-28956", "XSA-469" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ejhc-6yqt-gkgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4385?format=api", "vulnerability_id": "VCID-evcg-2z3p-gbch", "summary": "PCI device pass-through with shared resources", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20795", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00067", "scoring_system": "epss", "scoring_elements": "0.20853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2194", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21966", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21953", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22156", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2215", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31146" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "0", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-461.html", "reference_id": "advisory-461.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T13:14:46Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-461.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-461.html", "reference_id": "XSA-461", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-461.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31146" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-evcg-2z3p-gbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4406?format=api", "vulnerability_id": "VCID-h9hz-vur7-kyhg", "summary": "x86: Incorrect input sanitisation in Viridian hypercalls", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58148", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06166", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0626", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06221", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07718", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07807", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07742", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07753", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07667", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07654", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58148" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58148" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-475.html", "reference_id": "advisory-475.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-03T14:25:18Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-475.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-475.html", "reference_id": "XSA-475", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-475.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58148" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h9hz-vur7-kyhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4397?format=api", "vulnerability_id": "VCID-j22f-mbqe-a7dk", "summary": "x86: Transitive Scheduler Attacks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36350.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36350", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01827", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01788", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01783", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02204", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09372", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0942", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09405", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0928", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09385", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36350" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035", "reference_id": "1109035", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350725", "reference_id": "2350725", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350725" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html", "reference_id": "amd-sb-7029.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T20:23:14Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19930", "reference_id": "RHSA-2025:19930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://usn.ubuntu.com/7833-1/", "reference_id": "USN-7833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-1/" }, { "reference_url": "https://usn.ubuntu.com/7833-2/", "reference_id": "USN-7833-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-2/" }, { "reference_url": "https://usn.ubuntu.com/7833-3/", "reference_id": "USN-7833-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-3/" }, { "reference_url": "https://usn.ubuntu.com/7833-4/", "reference_id": "USN-7833-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-4/" }, { "reference_url": "https://usn.ubuntu.com/7834-1/", "reference_id": "USN-7834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7834-1/" }, { "reference_url": "https://usn.ubuntu.com/7848-1/", "reference_id": "USN-7848-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7848-1/" }, { "reference_url": "https://usn.ubuntu.com/7856-1/", "reference_id": "USN-7856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7856-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-471.html", "reference_id": "XSA-471", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-471.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-36350" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j22f-mbqe-a7dk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4376?format=api", "vulnerability_id": "VCID-p2fk-8snj-x7dy", "summary": "x86: Register File Data Sampling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14976", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15014", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15419", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15947", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15885", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15693", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15761", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1583", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15868", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15746", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-28746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52435" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0607" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1151" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22099" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108", "reference_id": "1066108", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1066108" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/12/13", "reference_id": "13", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/03/12/13" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270700", "reference_id": "2270700", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270700" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/", "reference_id": "EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/", "reference_id": "H63LGAQXPEVJOES73U4XK65I6DASOAAG", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html", "reference_id": "intel-sa-00898.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html", "reference_id": "msg00003.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8157", "reference_id": "RHSA-2024:8157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8158", "reference_id": "RHSA-2024:8158", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8158" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8162", "reference_id": "RHSA-2024:8162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9401", "reference_id": "RHSA-2024:9401", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9401" }, { "reference_url": "https://usn.ubuntu.com/6797-1/", "reference_id": "USN-6797-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6797-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-452.html", "reference_id": "XSA-452", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-452.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/", "reference_id": "ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-14T18:58:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-28746", "XSA-452" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fk-8snj-x7dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4388?format=api", "vulnerability_id": "VCID-psaa-jdr7-e3fm", "summary": "libxl leaks data to PVH guests via ACPI tables", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45819", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19749", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19801", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2249", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22656", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22499", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22491", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22713", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22747", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.2269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22703", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45819" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45819" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-464.html", "reference_id": "advisory-464.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-31T18:56:31Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-464.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-464.html", "reference_id": "XSA-464", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-464.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-45819", "XSA-464" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-psaa-jdr7-e3fm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4315?format=api", "vulnerability_id": "VCID-q3p3-tgay-6kcs", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06314", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06327", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06417", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06409", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06403", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06332", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06343", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06491", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09205", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09232", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5572-1/", "reference_id": "USN-5572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-1/" }, { "reference_url": "https://usn.ubuntu.com/5572-2/", "reference_id": "USN-5572-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5572-2/" }, { "reference_url": "https://usn.ubuntu.com/5579-1/", "reference_id": "USN-5579-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5579-1/" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-33740" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3p3-tgay-6kcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4412?format=api", "vulnerability_id": "VCID-qsma-2ufh-jybe", "summary": "Xenstored DoS by unprivileged domain", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23555", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03345", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03408", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03292", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03357", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03355", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03327", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03306", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04132", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.0408", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04099", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-23555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23555" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-481.html", "reference_id": "advisory-481.html", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-23T14:11:41Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-481.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-481.html", "reference_id": "XSA-481", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-481.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2026-23555", "XSA-481" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qsma-2ufh-jybe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4386?format=api", "vulnerability_id": "VCID-rdub-9bhg-nbc6", "summary": "x86: Deadlock in vlapic_error()", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66056", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66026", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66046", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66057", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65985", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66033", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66019", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.65989", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66025", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66039", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45817" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-462.html", "reference_id": "advisory-462.html", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T13:35:45Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-462.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-462.html", "reference_id": "XSA-462", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-462.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-45817", "XSA-462" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdub-9bhg-nbc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4371?format=api", "vulnerability_id": "VCID-rk2f-yqbb-nyd2", "summary": "arm32: The cache may not be properly cleaned/invalidated (take two)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46837", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23587", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23782", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2377", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23749", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23633", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23622", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2391", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2374", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.2381", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23872", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23827", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23771", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46837" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46837" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-447.html", "reference_id": "advisory-447.html", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-447.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/", "reference_id": "JFVKWYQFRUU3CAS53THTUKXEOUDWI42G", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFVKWYQFRUU3CAS53THTUKXEOUDWI42G/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/", "reference_id": "XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T20:11:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XLL6SQ6IKFYXLYWITYZCRV5IBRK5G35R/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-447.html", "reference_id": "XSA-447", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-447.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46837", "XSA-447" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rk2f-yqbb-nyd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4378?format=api", "vulnerability_id": "VCID-rt5n-e4wq-p3gh", "summary": "x86 HVM hypercalls may trigger Xen bug check", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84099", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.83982", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84062", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84088", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84094", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.83997", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84023", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.8403", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84047", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.8404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84035", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84058", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02093", "scoring_system": "epss", "scoring_elements": "0.84061", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46842" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-454.html", "reference_id": "advisory-454.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-24T18:23:20Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-454.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-454.html", "reference_id": "XSA-454", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-454.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46842", "XSA-454" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rt5n-e4wq-p3gh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4402?format=api", "vulnerability_id": "VCID-tjgh-waa3-wqgk", "summary": "Arm issues with page refcounting", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58144", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18107", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18052", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18162", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18288", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18215", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.182", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19249", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19147", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19111", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58144" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-473.html", "reference_id": "advisory-473.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-09-11T14:18:50Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-473.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-473.html", "reference_id": "XSA-473", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-473.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58144", "XSA-473" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tjgh-waa3-wqgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4398?format=api", "vulnerability_id": "VCID-uv8m-bj4c-8fes", "summary": "x86: Transitive Scheduler Attacks", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-36357.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36357", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08597", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09825", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09765", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09793", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09776", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09661", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09633", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10849", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10808", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10748", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-36357" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035", "reference_id": "1109035", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109035" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350726", "reference_id": "2350726", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2350726" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html", "reference_id": "amd-sb-7029.html", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:36:59Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19930", "reference_id": "RHSA-2025:19930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20095", "reference_id": "RHSA-2025:20095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20518", "reference_id": "RHSA-2025:20518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20518" }, { "reference_url": "https://usn.ubuntu.com/7833-1/", "reference_id": "USN-7833-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-1/" }, { "reference_url": "https://usn.ubuntu.com/7833-2/", "reference_id": "USN-7833-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-2/" }, { "reference_url": "https://usn.ubuntu.com/7833-3/", "reference_id": "USN-7833-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-3/" }, { "reference_url": "https://usn.ubuntu.com/7833-4/", "reference_id": "USN-7833-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7833-4/" }, { "reference_url": "https://usn.ubuntu.com/7834-1/", "reference_id": "USN-7834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7834-1/" }, { "reference_url": "https://usn.ubuntu.com/7848-1/", "reference_id": "USN-7848-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7848-1/" }, { "reference_url": "https://usn.ubuntu.com/7856-1/", "reference_id": "USN-7856-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7856-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-1/", "reference_id": "USN-8028-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-1/" }, { "reference_url": "https://usn.ubuntu.com/8028-2/", "reference_id": "USN-8028-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-2/" }, { "reference_url": "https://usn.ubuntu.com/8028-3/", "reference_id": "USN-8028-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-3/" }, { "reference_url": "https://usn.ubuntu.com/8028-4/", "reference_id": "USN-8028-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-4/" }, { "reference_url": "https://usn.ubuntu.com/8028-5/", "reference_id": "USN-8028-5", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-5/" }, { "reference_url": "https://usn.ubuntu.com/8028-6/", "reference_id": "USN-8028-6", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-6/" }, { "reference_url": "https://usn.ubuntu.com/8028-7/", "reference_id": "USN-8028-7", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-7/" }, { "reference_url": "https://usn.ubuntu.com/8028-8/", "reference_id": "USN-8028-8", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8028-8/" }, { "reference_url": "https://usn.ubuntu.com/8031-1/", "reference_id": "USN-8031-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-1/" }, { "reference_url": "https://usn.ubuntu.com/8031-2/", "reference_id": "USN-8031-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-2/" }, { "reference_url": "https://usn.ubuntu.com/8031-3/", "reference_id": "USN-8031-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8031-3/" }, { "reference_url": "https://usn.ubuntu.com/8052-1/", "reference_id": "USN-8052-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-1/" }, { "reference_url": "https://usn.ubuntu.com/8052-2/", "reference_id": "USN-8052-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8052-2/" }, { "reference_url": "https://usn.ubuntu.com/8074-1/", "reference_id": "USN-8074-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-1/" }, { "reference_url": "https://usn.ubuntu.com/8074-2/", "reference_id": "USN-8074-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8074-2/" }, { "reference_url": "https://usn.ubuntu.com/8126-1/", "reference_id": "USN-8126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8126-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-471.html", "reference_id": "XSA-471", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-471.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-36357", "XSA-471" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uv8m-bj4c-8fes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4401?format=api", "vulnerability_id": "VCID-vv23-mvyn-87hg", "summary": "Mutiple vulnerabilities in the Viridian interface", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14661", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15748", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15762", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1572", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15702", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.15764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16688", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16827", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16761", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16703", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16641", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58143" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-472.html", "reference_id": "advisory-472.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:21:09Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-472.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-472.html", "reference_id": "XSA-472", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-472.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58143" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vv23-mvyn-87hg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4369?format=api", "vulnerability_id": "VCID-wd4s-jxuf-skbp", "summary": "x86/AMD: mismatch in IOMMU quarantine page table levels", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46835", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24807", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25096", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.2492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24863", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24851", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25134", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25022", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.25036", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24996", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24941", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24947", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-46835" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46835" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928", "reference_id": "1056928", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056928" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-445.html", "reference_id": "advisory-445.html", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-12T04:00:28Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-445.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-445.html", "reference_id": "XSA-445", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-445.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-46835", "XSA-445" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wd4s-jxuf-skbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4400?format=api", "vulnerability_id": "VCID-wz1m-aeaf-nkg7", "summary": "Mutiple vulnerabilities in the Viridian interface", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0691", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00025", "scoring_system": "epss", "scoring_elements": "0.0696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07717", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07643", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07611", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07576", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07665", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08147", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08071", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08132", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.0811", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08017", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-58142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-472.html", "reference_id": "advisory-472.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-11T14:24:28Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-472.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-472.html", "reference_id": "XSA-472", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-472.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-58142", "XSA-472" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wz1m-aeaf-nkg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4396?format=api", "vulnerability_id": "VCID-xqpz-y83m-4uc4", "summary": "x86: Incorrect stubs exception handling for flags recovery", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27465", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24037", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.2399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24143", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25463", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25711", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.2567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25613", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00091", "scoring_system": "epss", "scoring_elements": "0.25598", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27465" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075", "reference_id": "1120075", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120075" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-470.html", "reference_id": "advisory-470.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-16T20:46:06Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-470.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-470.html", "reference_id": "XSA-470", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-470.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2025-27465", "XSA-470" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqpz-y83m-4uc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4364?format=api", "vulnerability_id": "VCID-ye1t-qhtx-sucm", "summary": "x86/AMD: missing IOMMU TLB flushing", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34326", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.2812", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.27924", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28368", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28266", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28169", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28183", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28165", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-34326" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34326" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-442.html", "reference_id": "advisory-442.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-14T20:27:29Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-442.html" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-442.html", "reference_id": "XSA-442", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-442.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2023-34326", "XSA-442" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ye1t-qhtx-sucm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4379?format=api", "vulnerability_id": "VCID-z9rm-9p2q-wfag", "summary": "x86: Incorrect logic for BTC/SRSO mitigations", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31142", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.8688", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86856", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86872", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86879", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86789", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86808", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86802", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86821", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.8683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86843", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86835", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03118", "scoring_system": "epss", "scoring_elements": "0.86852", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-31142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31142" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://xenbits.xenproject.org/xsa/advisory-455.html", "reference_id": "advisory-455.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T13:51:28Z/" } ], "url": "https://xenbits.xenproject.org/xsa/advisory-455.html" }, { "reference_url": "https://security.gentoo.org/glsa/202409-10", "reference_id": "GLSA-202409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-10" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-455.html", "reference_id": "XSA-455", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-455.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2024-31142", "XSA-455" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z9rm-9p2q-wfag" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4317?format=api", "vulnerability_id": "VCID-zkeg-d5d5-vbda", "summary": "Linux disk/nic frontends data leaks", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06317", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06117", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06188", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06183", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06175", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06134", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06146", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08915", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08931", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2318" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26365" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33740" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33744" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://usn.ubuntu.com/5623-1/", "reference_id": "USN-5623-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5623-1/" }, { "reference_url": "https://usn.ubuntu.com/5624-1/", "reference_id": "USN-5624-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5624-1/" }, { "reference_url": "https://usn.ubuntu.com/5633-1/", "reference_id": "USN-5633-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5633-1/" }, { "reference_url": "https://usn.ubuntu.com/5635-1/", "reference_id": "USN-5635-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5635-1/" }, { "reference_url": "https://usn.ubuntu.com/5640-1/", "reference_id": "USN-5640-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5640-1/" }, { "reference_url": "https://usn.ubuntu.com/5644-1/", "reference_id": "USN-5644-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5644-1/" }, { "reference_url": "https://usn.ubuntu.com/5648-1/", "reference_id": "USN-5648-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5648-1/" }, { "reference_url": "https://usn.ubuntu.com/5655-1/", "reference_id": "USN-5655-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5655-1/" }, { "reference_url": "https://usn.ubuntu.com/5668-1/", "reference_id": "USN-5668-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5668-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-1/", "reference_id": "USN-5669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-1/" }, { "reference_url": "https://usn.ubuntu.com/5669-2/", "reference_id": "USN-5669-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5669-2/" }, { "reference_url": "https://usn.ubuntu.com/5677-1/", "reference_id": "USN-5677-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5677-1/" }, { "reference_url": "https://usn.ubuntu.com/5678-1/", "reference_id": "USN-5678-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5678-1/" }, { "reference_url": "https://usn.ubuntu.com/5679-1/", "reference_id": "USN-5679-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5679-1/" }, { "reference_url": "https://usn.ubuntu.com/5682-1/", "reference_id": "USN-5682-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5682-1/" }, { "reference_url": "https://usn.ubuntu.com/5683-1/", "reference_id": "USN-5683-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5683-1/" }, { "reference_url": "https://usn.ubuntu.com/5684-1/", "reference_id": "USN-5684-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5684-1/" }, { "reference_url": "https://usn.ubuntu.com/5687-1/", "reference_id": "USN-5687-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5687-1/" }, { "reference_url": "https://usn.ubuntu.com/5695-1/", "reference_id": "USN-5695-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5695-1/" }, { "reference_url": "https://usn.ubuntu.com/5706-1/", "reference_id": "USN-5706-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5706-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-403.html", "reference_id": "XSA-403", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-403.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994413?format=api", "purl": "pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-qpfc-3296-9ub3" }, { "vulnerability": "VCID-upju-tcz7-efg1" }, { "vulnerability": "VCID-wx6w-6y5m-fugn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" } ], "aliases": [ "CVE-2022-33742" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zkeg-d5d5-vbda" } ], "risk_score": "2.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1" }