{"url":"http://public2.vulnerablecode.io/api/packages/425055?format=json","purl":"pkg:apk/alpine/xen@4.10.1-r1?arch=s390x&distroversion=v3.22&reponame=main","type":"apk","namespace":"alpine","name":"xen","version":"4.10.1-r1","qualifiers":{"arch":"s390x","distroversion":"v3.22","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.11.0-r0","latest_non_vulnerable_version":"4.20.3-r2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4148?format=json","vulnerability_id":"VCID-5gua-j7zw-a7ex","summary":"qemu may drive Xen into unbounded loop","references":[{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10981","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21661","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21516","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2151","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21885","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21694","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21664","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"http://www.securityfocus.com/bid/104149","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104149"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571881","reference_id":"1571881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571881"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10981","reference_id":"CVE-2018-10981","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10981"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-262.html","reference_id":"XSA-262","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-262.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/425055?format=json","purl":"pkg:apk/alpine/xen@4.10.1-r1?arch=s390x&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.10.1-r1%3Farch=s390x&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2018-10981","XSA-262"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gua-j7zw-a7ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4147?format=json","vulnerability_id":"VCID-cvdk-37ua-3uck","summary":"x86 vHPET interrupt injection errors","references":[{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10982","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21233","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2114","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"http://www.securityfocus.com/bid/104150","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571880","reference_id":"1571880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571880"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10982","reference_id":"CVE-2018-10982","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10982"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-261.html","reference_id":"XSA-261","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-261.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/425055?format=json","purl":"pkg:apk/alpine/xen@4.10.1-r1?arch=s390x&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.10.1-r1%3Farch=s390x&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2018-10982","XSA-261"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cvdk-37ua-3uck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4146?format=json","vulnerability_id":"VCID-qmav-pppv-p3e1","summary":"x86: mishandling of debug exceptions","references":[{"reference_url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9"},{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/1"},{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/4"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8897.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8897","reference_id":"","reference_type":"","scores":[{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96152","published_at":"2026-04-16T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.96157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.24723","scoring_system":"epss","scoring_elements":"0.9616","published_at":"2026-04-24T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96113","published_at":"2026-04-01T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96127","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96143","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24796","scoring_system":"epss","scoring_elements":"0.96147","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-8897"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/can1357/CVE-2018-8897/","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/can1357/CVE-2018-8897/"},{"reference_url":"https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"},{"reference_url":"https://patchwork.kernel.org/patch/10386677/","reference_id":"","reference_type":"","scores":[],"url":"https://patchwork.kernel.org/patch/10386677/"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180927-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180927-0002/"},{"reference_url":"https://support.apple.com/HT208742","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208742"},{"reference_url":"https://support.citrix.com/article/CTX234679","reference_id":"","reference_type":"","scores":[],"url":"https://support.citrix.com/article/CTX234679"},{"reference_url":"https://svnweb.freebsd.org/base?view=revision&revision=333368","reference_id":"","reference_type":"","scores":[],"url":"https://svnweb.freebsd.org/base?view=revision&revision=333368"},{"reference_url":"https://www.debian.org/security/2018/dsa-4196","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4196"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"https://www.exploit-db.com/exploits/44697/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44697/"},{"reference_url":"https://www.exploit-db.com/exploits/45024/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/45024/"},{"reference_url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc","reference_id":"","reference_type":"","scores":[],"url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc"},{"reference_url":"https://www.kb.cert.org/vuls/id/631579","reference_id":"","reference_type":"","scores":[],"url":"https://www.kb.cert.org/vuls/id/631579"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_18_21","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/support/security/Synology_SA_18_21"},{"reference_url":"https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en"},{"reference_url":"http://www.securityfocus.com/bid/104071","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104071"},{"reference_url":"http://www.securitytracker.com/id/1040744","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040744"},{"reference_url":"http://www.securitytracker.com/id/1040849","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040849"},{"reference_url":"http://www.securitytracker.com/id/1040861","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040861"},{"reference_url":"http://www.securitytracker.com/id/1040866","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040866"},{"reference_url":"http://www.securitytracker.com/id/1040882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1567074","reference_id":"1567074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1567074"},{"reference_url":"https://security.archlinux.org/AVG-701","reference_id":"AVG-701","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-701"},{"reference_url":"https://security.archlinux.org/AVG-702","reference_id":"AVG-702","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-702"},{"reference_url":"https://security.archlinux.org/AVG-703","reference_id":"AVG-703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-703"},{"reference_url":"https://security.archlinux.org/AVG-704","reference_id":"AVG-704","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-704"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*","reference_id":"cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*"},{"reference_url":"https://github.com/can1357/CVE-2018-8897","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://github.com/can1357/CVE-2018-8897"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/44697.txt","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/44697.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/45024.rb","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/45024.rb"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8897","reference_id":"CVE-2018-8897","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8897"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/b40a1467232a84c19b0c8f16a36e2b9973cab951/modules/exploits/windows/local/mov_ss.rb","reference_id":"CVE-2018-8897","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/b40a1467232a84c19b0c8f16a36e2b9973cab951/modules/exploits/windows/local/mov_ss.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1318","reference_id":"RHSA-2018:1318","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1319","reference_id":"RHSA-2018:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1345","reference_id":"RHSA-2018:1345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1346","reference_id":"RHSA-2018:1346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1347","reference_id":"RHSA-2018:1347","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1348","reference_id":"RHSA-2018:1348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1349","reference_id":"RHSA-2018:1349","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1349"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1350","reference_id":"RHSA-2018:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1351","reference_id":"RHSA-2018:1351","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1351"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1352","reference_id":"RHSA-2018:1352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1353","reference_id":"RHSA-2018:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1354","reference_id":"RHSA-2018:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1355","reference_id":"RHSA-2018:1355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1524","reference_id":"RHSA-2018:1524","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1524"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1710","reference_id":"RHSA-2018:1710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1711","reference_id":"RHSA-2018:1711","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1711"},{"reference_url":"https://usn.ubuntu.com/3641-1/","reference_id":"USN-3641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3641-1/"},{"reference_url":"https://usn.ubuntu.com/3641-2/","reference_id":"USN-3641-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3641-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-260.html","reference_id":"XSA-260","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-260.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/425055?format=json","purl":"pkg:apk/alpine/xen@4.10.1-r1?arch=s390x&distroversion=v3.22&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.10.1-r1%3Farch=s390x&distroversion=v3.22&reponame=main"}],"aliases":["CVE-2018-8897","XSA-260"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmav-pppv-p3e1"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/xen@4.10.1-r1%3Farch=s390x&distroversion=v3.22&reponame=main"}