{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","type":"ebuild","namespace":"app-emulation","name":"xen-tools","version":"4.10.1-r2","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.12.0-r1","latest_non_vulnerable_version":"4.15.3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4148?format=json","vulnerability_id":"VCID-5gua-j7zw-a7ex","summary":"qemu may drive Xen into unbounded loop","references":[{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10981","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21661","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21468","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21497","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21885","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21687","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21694","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21664","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21516","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2151","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"http://www.securityfocus.com/bid/104149","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104149"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571881","reference_id":"1571881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571881"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10981","reference_id":"CVE-2018-10981","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10981"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-262.html","reference_id":"XSA-262","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-262.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-10981","XSA-262"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5gua-j7zw-a7ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4160?format=json","vulnerability_id":"VCID-6jsn-7538-a7ha","summary":"L1 Terminal Fault speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3646.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3646","reference_id":"","reference_type":"","scores":[{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88182","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88255","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.8829","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.8819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88231","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88249","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03877","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0398","scoring_system":"epss","scoring_elements":"0.88427","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3646"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005","reference_id":"1585005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2384","reference_id":"RHSA-2018:2384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2388","reference_id":"RHSA-2018:2388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2389","reference_id":"RHSA-2018:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2391","reference_id":"RHSA-2018:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2392","reference_id":"RHSA-2018:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2393","reference_id":"RHSA-2018:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2395","reference_id":"RHSA-2018:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2402","reference_id":"RHSA-2018:2402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2403","reference_id":"RHSA-2018:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2404","reference_id":"RHSA-2018:2404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2602","reference_id":"RHSA-2018:2602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2603","reference_id":"RHSA-2018:2603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2603"},{"reference_url":"https://usn.ubuntu.com/3740-1/","reference_id":"USN-3740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-1/"},{"reference_url":"https://usn.ubuntu.com/3740-2/","reference_id":"USN-3740-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-2/"},{"reference_url":"https://usn.ubuntu.com/3741-1/","reference_id":"USN-3741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-1/"},{"reference_url":"https://usn.ubuntu.com/3741-2/","reference_id":"USN-3741-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-2/"},{"reference_url":"https://usn.ubuntu.com/3742-1/","reference_id":"USN-3742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-1/"},{"reference_url":"https://usn.ubuntu.com/3742-2/","reference_id":"USN-3742-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-2/"},{"reference_url":"https://usn.ubuntu.com/3756-1/","reference_id":"USN-3756-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3756-1/"},{"reference_url":"https://usn.ubuntu.com/3823-1/","reference_id":"USN-3823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3823-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-273.html","reference_id":"XSA-273","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-273.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-3646","XSA-273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6jsn-7538-a7ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4159?format=json","vulnerability_id":"VCID-7vn6-5h93-27hn","summary":"L1 Terminal Fault speculative side channel","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3620","reference_id":"","reference_type":"","scores":[{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84713","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.8467","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02259","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0232","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86679","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.8667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86607","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03037","scoring_system":"epss","scoring_elements":"0.86618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005","reference_id":"1585005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1585005"},{"reference_url":"https://security.archlinux.org/AVG-756","reference_id":"AVG-756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-756"},{"reference_url":"https://security.archlinux.org/AVG-757","reference_id":"AVG-757","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-757"},{"reference_url":"https://security.archlinux.org/AVG-758","reference_id":"AVG-758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-758"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2384","reference_id":"RHSA-2018:2384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2387","reference_id":"RHSA-2018:2387","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2387"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2388","reference_id":"RHSA-2018:2388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2388"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2389","reference_id":"RHSA-2018:2389","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2389"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2390","reference_id":"RHSA-2018:2390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2391","reference_id":"RHSA-2018:2391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2392","reference_id":"RHSA-2018:2392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2393","reference_id":"RHSA-2018:2393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2394","reference_id":"RHSA-2018:2394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2395","reference_id":"RHSA-2018:2395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2396","reference_id":"RHSA-2018:2396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2402","reference_id":"RHSA-2018:2402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2403","reference_id":"RHSA-2018:2403","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2404","reference_id":"RHSA-2018:2404","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2404"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2602","reference_id":"RHSA-2018:2602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2603","reference_id":"RHSA-2018:2603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2603"},{"reference_url":"https://usn.ubuntu.com/3740-1/","reference_id":"USN-3740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-1/"},{"reference_url":"https://usn.ubuntu.com/3740-2/","reference_id":"USN-3740-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3740-2/"},{"reference_url":"https://usn.ubuntu.com/3741-1/","reference_id":"USN-3741-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-1/"},{"reference_url":"https://usn.ubuntu.com/3741-2/","reference_id":"USN-3741-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3741-2/"},{"reference_url":"https://usn.ubuntu.com/3742-1/","reference_id":"USN-3742-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-1/"},{"reference_url":"https://usn.ubuntu.com/3742-2/","reference_id":"USN-3742-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3742-2/"},{"reference_url":"https://usn.ubuntu.com/3823-1/","reference_id":"USN-3823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3823-1/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-273.html","reference_id":"XSA-273","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-273.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-3620"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vn6-5h93-27hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4142?format=json","vulnerability_id":"VCID-8g31-68m7-b3ak","summary":"grant table v2 -> v1 transition may crash Xen","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7541","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25963","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25923","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25865","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25763","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25716","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25605","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25672","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544459","reference_id":"1544459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544459"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-255.html","reference_id":"XSA-255","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-255.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-7541","XSA-255"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8g31-68m7-b3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4139?format=json","vulnerability_id":"VCID-9yjh-xh86-d7h8","summary":"Information leak via side effects of speculative execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5753","reference_id":"","reference_type":"","scores":[{"value":"0.94297","scoring_system":"epss","scoring_elements":"0.99946","published_at":"2026-05-07T12:55:00Z"},{"value":"0.94297","scoring_system":"epss","scoring_elements":"0.99945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.94332","scoring_system":"epss","scoring_elements":"0.99953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.94332","scoring_system":"epss","scoring_elements":"0.99954","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:N/A:N"},{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519778","reference_id":"1519778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519778"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852","reference_id":"886852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"},{"reference_url":"https://security.archlinux.org/AVG-557","reference_id":"AVG-557","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-557"},{"reference_url":"https://security.archlinux.org/AVG-558","reference_id":"AVG-558","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-558"},{"reference_url":"https://security.archlinux.org/AVG-559","reference_id":"AVG-559","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-559"},{"reference_url":"https://security.archlinux.org/AVG-987","reference_id":"AVG-987","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-987"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0010","reference_id":"RHSA-2018:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0016","reference_id":"RHSA-2018:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0017","reference_id":"RHSA-2018:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0018","reference_id":"RHSA-2018:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0020","reference_id":"RHSA-2018:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0021","reference_id":"RHSA-2018:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0022","reference_id":"RHSA-2018:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0151","reference_id":"RHSA-2018:0151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0182","reference_id":"RHSA-2018:0182","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0182"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0292","reference_id":"RHSA-2018:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0464","reference_id":"RHSA-2018:0464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0496","reference_id":"RHSA-2018:0496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0512","reference_id":"RHSA-2018:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0654","reference_id":"RHSA-2018:0654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0654"},{"reference_url":"https://usn.ubuntu.com/3516-1/","reference_id":"USN-3516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3516-1/"},{"reference_url":"https://usn.ubuntu.com/3521-1/","reference_id":"USN-3521-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3521-1/"},{"reference_url":"https://usn.ubuntu.com/3530-1/","reference_id":"USN-3530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3530-1/"},{"reference_url":"https://usn.ubuntu.com/3540-1/","reference_id":"USN-3540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-1/"},{"reference_url":"https://usn.ubuntu.com/3540-2/","reference_id":"USN-3540-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-2/"},{"reference_url":"https://usn.ubuntu.com/3541-1/","reference_id":"USN-3541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-1/"},{"reference_url":"https://usn.ubuntu.com/3541-2/","reference_id":"USN-3541-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-2/"},{"reference_url":"https://usn.ubuntu.com/3542-1/","reference_id":"USN-3542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3542-1/"},{"reference_url":"https://usn.ubuntu.com/3542-2/","reference_id":"USN-3542-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3542-2/"},{"reference_url":"https://usn.ubuntu.com/3549-1/","reference_id":"USN-3549-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3549-1/"},{"reference_url":"https://usn.ubuntu.com/3580-1/","reference_id":"USN-3580-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3580-1/"},{"reference_url":"https://usn.ubuntu.com/3597-1/","reference_id":"USN-3597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3597-1/"},{"reference_url":"https://usn.ubuntu.com/3597-2/","reference_id":"USN-3597-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3597-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-254.html","reference_id":"XSA-254","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-254.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2017-5753"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9yjh-xh86-d7h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4154?format=json","vulnerability_id":"VCID-cuab-yybg-6uhs","summary":"Use of v2 grant tables may cause crash on ARM","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15469.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15469","reference_id":"","reference_type":"","scores":[{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39828","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39974","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.3999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.4","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.3955","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610543","reference_id":"1610543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610543"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-268.html","reference_id":"XSA-268","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-268.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-15469","XSA-268"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cuab-yybg-6uhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4147?format=json","vulnerability_id":"VCID-cvdk-37ua-3uck","summary":"x86 vHPET interrupt injection errors","references":[{"reference_url":"http://openwall.com/lists/oss-security/2018/05/08/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2018/05/08/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10982","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21081","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21233","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21138","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2114","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20992","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"http://www.securityfocus.com/bid/104150","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571880","reference_id":"1571880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1571880"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10982","reference_id":"CVE-2018-10982","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10982"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-261.html","reference_id":"XSA-261","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-261.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-10982","XSA-261"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cvdk-37ua-3uck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4152?format=json","vulnerability_id":"VCID-eutx-gmuf-gkeq","summary":"libxl fails to honour readonly flag on HVM emulated SCSI disks","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12892.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12892","reference_id":"","reference_type":"","scores":[{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.85975","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86123","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86082","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86102","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.85986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86002","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86045","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86061","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02771","scoring_system":"epss","scoring_elements":"0.86052","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12892"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2018/dsa-4236","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4236"},{"reference_url":"http://www.openwall.com/lists/oss-security/2018/06/27/12","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2018/06/27/12"},{"reference_url":"http://www.securityfocus.com/bid/104571","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104571"},{"reference_url":"http://www.securitytracker.com/id/1041203","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041203"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-266.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-266.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590984","reference_id":"1590984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590984"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12892","reference_id":"CVE-2018-12892","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"},{"value":"9.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12892"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-266.html","reference_id":"XSA-266","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-266.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-12892","XSA-266"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"8.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eutx-gmuf-gkeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4145?format=json","vulnerability_id":"VCID-fafv-creg-qfbt","summary":"x86: PV guest may crash Xen with XPTI","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10471.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10471","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18132","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18043","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18396","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18448","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18293","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18331","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18218","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"http://www.securityfocus.com/bid/104003","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104003"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566220","reference_id":"1566220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566220"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10471","reference_id":"CVE-2018-10471","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10471"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-259.html","reference_id":"XSA-259","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-259.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-10471","XSA-259"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fafv-creg-qfbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4151?format=json","vulnerability_id":"VCID-mehs-bmad-pkds","summary":"x86: #DB exception safety check can be triggered by a guest","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12893","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2139","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21429","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2169","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21612","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21434","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"},{"reference_url":"https://support.citrix.com/article/CTX235748","reference_id":"","reference_type":"","scores":[],"url":"https://support.citrix.com/article/CTX235748"},{"reference_url":"https://www.debian.org/security/2018/dsa-4236","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4236"},{"reference_url":"http://www.openwall.com/lists/oss-security/2018/06/27/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2018/06/27/11"},{"reference_url":"http://www.securityfocus.com/bid/104572","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104572"},{"reference_url":"http://www.securitytracker.com/id/1041202","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041202"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-265.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-265.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590979","reference_id":"1590979","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590979"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:x86"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12893","reference_id":"CVE-2018-12893","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12893"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-265.html","reference_id":"XSA-265","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-265.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-12893","XSA-265"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mehs-bmad-pkds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4150?format=json","vulnerability_id":"VCID-nmg3-4zaj-zbaq","summary":"preemption checks bypassed in x86 PV MM handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12891","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2208","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21888","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21906","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21815","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22237","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22284","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22068","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22148","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22203","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22183","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22122","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21931","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-12891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html"},{"reference_url":"https://support.citrix.com/article/CTX235748","reference_id":"","reference_type":"","scores":[],"url":"https://support.citrix.com/article/CTX235748"},{"reference_url":"https://www.debian.org/security/2018/dsa-4236","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4236"},{"reference_url":"http://www.openwall.com/lists/oss-security/2018/06/27/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2018/06/27/10"},{"reference_url":"http://www.securityfocus.com/bid/104570","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104570"},{"reference_url":"http://www.securitytracker.com/id/1041201","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041201"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-264.html","reference_id":"","reference_type":"","scores":[],"url":"http://xenbits.xen.org/xsa/advisory-264.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590985","reference_id":"1590985","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1590985"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12891","reference_id":"CVE-2018-12891","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-12891"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-264.html","reference_id":"XSA-264","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-264.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-12891","XSA-264"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nmg3-4zaj-zbaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4141?format=json","vulnerability_id":"VCID-rgt3-wkaw-eqca","summary":"Information leak via side effects of speculative execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5754.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5754","reference_id":"","reference_type":"","scores":[{"value":"0.87621","scoring_system":"epss","scoring_elements":"0.99463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.87621","scoring_system":"epss","scoring_elements":"0.9947","published_at":"2026-04-18T12:55:00Z"},{"value":"0.87621","scoring_system":"epss","scoring_elements":"0.99469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.87621","scoring_system":"epss","scoring_elements":"0.99466","published_at":"2026-04-13T12:55:00Z"},{"value":"0.87621","scoring_system":"epss","scoring_elements":"0.99465","published_at":"2026-04-12T12:55:00Z"},{"value":"0.87752","scoring_system":"epss","scoring_elements":"0.99466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.87752","scoring_system":"epss","scoring_elements":"0.99463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.87752","scoring_system":"epss","scoring_elements":"0.99462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.87752","scoring_system":"epss","scoring_elements":"0.99464","published_at":"2026-04-04T12:55:00Z"},{"value":"0.87752","scoring_system":"epss","scoring_elements":"0.99467","published_at":"2026-04-08T12:55:00Z"},{"value":"0.88229","scoring_system":"epss","scoring_elements":"0.99495","published_at":"2026-04-21T12:55:00Z"},{"value":"0.8869","scoring_system":"epss","scoring_elements":"0.99518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.8869","scoring_system":"epss","scoring_elements":"0.99517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.88802","scoring_system":"epss","scoring_elements":"0.99522","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519781","reference_id":"1519781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519781"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852","reference_id":"886852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"},{"reference_url":"https://security.archlinux.org/ASA-201801-1","reference_id":"ASA-201801-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-1"},{"reference_url":"https://security.archlinux.org/ASA-201801-3","reference_id":"ASA-201801-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-3"},{"reference_url":"https://security.archlinux.org/ASA-201801-4","reference_id":"ASA-201801-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-4"},{"reference_url":"https://security.archlinux.org/ASA-201801-6","reference_id":"ASA-201801-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-6"},{"reference_url":"https://security.archlinux.org/AVG-552","reference_id":"AVG-552","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-552"},{"reference_url":"https://security.archlinux.org/AVG-571","reference_id":"AVG-571","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-571"},{"reference_url":"https://security.archlinux.org/AVG-574","reference_id":"AVG-574","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-574"},{"reference_url":"https://security.archlinux.org/AVG-577","reference_id":"AVG-577","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-577"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0010","reference_id":"RHSA-2018:0010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0016","reference_id":"RHSA-2018:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0017","reference_id":"RHSA-2018:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0018","reference_id":"RHSA-2018:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0020","reference_id":"RHSA-2018:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0021","reference_id":"RHSA-2018:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0022","reference_id":"RHSA-2018:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0292","reference_id":"RHSA-2018:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0464","reference_id":"RHSA-2018:0464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1129","reference_id":"RHSA-2018:1129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1319","reference_id":"RHSA-2018:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1346","reference_id":"RHSA-2018:1346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1374","reference_id":"RHSA-2018:1374","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1374"},{"reference_url":"https://usn.ubuntu.com/3516-1/","reference_id":"USN-3516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3516-1/"},{"reference_url":"https://usn.ubuntu.com/3522-1/","reference_id":"USN-3522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3522-1/"},{"reference_url":"https://usn.ubuntu.com/3522-2/","reference_id":"USN-3522-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3522-2/"},{"reference_url":"https://usn.ubuntu.com/3523-1/","reference_id":"USN-3523-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3523-1/"},{"reference_url":"https://usn.ubuntu.com/3523-2/","reference_id":"USN-3523-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3523-2/"},{"reference_url":"https://usn.ubuntu.com/3524-1/","reference_id":"USN-3524-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3524-1/"},{"reference_url":"https://usn.ubuntu.com/3524-2/","reference_id":"USN-3524-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3524-2/"},{"reference_url":"https://usn.ubuntu.com/3525-1/","reference_id":"USN-3525-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3525-1/"},{"reference_url":"https://usn.ubuntu.com/3540-1/","reference_id":"USN-3540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-1/"},{"reference_url":"https://usn.ubuntu.com/3540-2/","reference_id":"USN-3540-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-2/"},{"reference_url":"https://usn.ubuntu.com/3541-1/","reference_id":"USN-3541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-1/"},{"reference_url":"https://usn.ubuntu.com/3541-2/","reference_id":"USN-3541-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-2/"},{"reference_url":"https://usn.ubuntu.com/3583-1/","reference_id":"USN-3583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3583-1/"},{"reference_url":"https://usn.ubuntu.com/3597-1/","reference_id":"USN-3597-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3597-1/"},{"reference_url":"https://usn.ubuntu.com/3597-2/","reference_id":"USN-3597-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3597-2/"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-254.html","reference_id":"XSA-254","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-254.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2017-5754"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rgt3-wkaw-eqca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4155?format=json","vulnerability_id":"VCID-rn1h-xy8j-uqgs","summary":"x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15468","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30206","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30236","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30102","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30123","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2999","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29874","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.2966","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29725","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610548","reference_id":"1610548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610548"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-269.html","reference_id":"XSA-269","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-269.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-15468","XSA-269"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rn1h-xy8j-uqgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4143?format=json","vulnerability_id":"VCID-sqyq-m67p-z7cc","summary":"x86 PVH guest without LAPIC may DoS the host","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7542.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7542","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16925","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1709","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1692","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17043","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16876","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16914","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16818","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16754","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16625","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16742","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7542"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544453","reference_id":"1544453","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544453"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-256.html","reference_id":"XSA-256","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-256.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-7542","XSA-256"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sqyq-m67p-z7cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4144?format=json","vulnerability_id":"VCID-t5uz-r29w-nueq","summary":"Information leak via crafted user-supplied CDROM","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10472","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25133","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24866","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24794","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25025","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25138","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25111","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25069","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.2497","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.24959","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4201","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4201"},{"reference_url":"http://www.securityfocus.com/bid/104002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566253","reference_id":"1566253","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1566253"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10472","reference_id":"CVE-2018-10472","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-10472"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-258.html","reference_id":"XSA-258","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-258.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-10472","XSA-258"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t5uz-r29w-nueq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4140?format=json","vulnerability_id":"VCID-v8fp-rzfq-e3bs","summary":"Information leak via side effects of speculative execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5715","reference_id":"","reference_type":"","scores":[{"value":"0.88597","scoring_system":"epss","scoring_elements":"0.995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.88597","scoring_system":"epss","scoring_elements":"0.99501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.89042","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-26T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99529","published_at":"2026-04-09T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.9953","published_at":"2026-04-13T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.89094","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-18T12:55:00Z"},{"value":"0.89147","scoring_system":"epss","scoring_elements":"0.99538","published_at":"2026-04-24T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99539","published_at":"2026-04-21T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99543","published_at":"2026-05-05T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99544","published_at":"2026-05-07T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.89198","scoring_system":"epss","scoring_elements":"0.99542","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18241"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1066"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1093"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5333"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7492"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:N/A:N"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102376","reference_id":"102376","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.securityfocus.com/bid/102376"},{"reference_url":"http://www.securitytracker.com/id/1040071","reference_id":"1040071","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.securitytracker.com/id/1040071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780","reference_id":"1519780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1519780"},{"reference_url":"https://www.kb.cert.org/vuls/id/180049","reference_id":"180049","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.kb.cert.org/vuls/id/180049"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/36","reference_id":"36","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://seclists.org/bugtraq/2019/Jun/36"},{"reference_url":"https://www.exploit-db.com/exploits/43427/","reference_id":"43427","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.exploit-db.com/exploits/43427/"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609","reference_id":"4609","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611","reference_id":"4611","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613","reference_id":"4613","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"},{"reference_url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614","reference_id":"4614","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"},{"reference_url":"http://www.kb.cert.org/vuls/id/584653","reference_id":"584653","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.kb.cert.org/vuls/id/584653"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532","reference_id":"886532","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886532"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852","reference_id":"886852","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886852"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002","reference_id":"ADV180002","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"},{"reference_url":"http://xenbits.xen.org/xsa/advisory-254.html","reference_id":"advisory-254.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://xenbits.xen.org/xsa/advisory-254.html"},{"reference_url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr","reference_id":"advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"},{"reference_url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt","reference_id":"ARUBA-PSA-2018-001.txt","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"},{"reference_url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt","reference_id":"ARUBA-PSA-2019-003.txt","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"reference_url":"https://security.archlinux.org/ASA-201801-10","reference_id":"ASA-201801-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-10"},{"reference_url":"https://security.archlinux.org/AVG-557","reference_id":"AVG-557","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-557"},{"reference_url":"https://security.archlinux.org/AVG-558","reference_id":"AVG-558","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-558"},{"reference_url":"https://security.archlinux.org/AVG-559","reference_id":"AVG-559","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-559"},{"reference_url":"https://security.archlinux.org/AVG-582","reference_id":"AVG-582","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-582"},{"reference_url":"https://security.archlinux.org/AVG-583","reference_id":"AVG-583","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-583"},{"reference_url":"https://security.archlinux.org/AVG-987","reference_id":"AVG-987","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-987"},{"reference_url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/","reference_id":"AWS-2018-013","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"},{"reference_url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel","reference_id":"cisco-sa-20180104-cpusidechannel","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"},{"reference_url":"https://support.citrix.com/article/CTX231399","reference_id":"CTX231399","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.citrix.com/article/CTX231399"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2017-5715","reference_id":"CVE-2017-5715","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.paloaltonetworks.com/CVE-2017-5715"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c","reference_id":"CVE-2017-5753;CVE-2017-5715","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/43427.c"},{"reference_url":"https://spectreattack.com/spectre.pdf","reference_id":"CVE-2017-5753;CVE-2017-5715","reference_type":"exploit","scores":[],"url":"https://spectreattack.com/spectre.pdf"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us","reference_id":"display?docId=emr_na-hpesbhf03805en_us","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","reference_id":"display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc","reference_id":"FreeBSD-SA-18:03.speculative_execution.asc","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"},{"reference_url":"https://security.gentoo.org/glsa/201804-08","reference_id":"GLSA-201804-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-08"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://support.f5.com/csp/article/K91229003","reference_id":"K91229003","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.f5.com/csp/article/K91229003"},{"reference_url":"https://support.lenovo.com/us/en/solutions/LEN-18282","reference_id":"LEN-18282","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"},{"reference_url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001","reference_id":"mitel-product-security-advisory-18-0001","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"},{"reference_url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/","reference_id":"mitigations-landing-new-class-timing-attack","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html","reference_id":"msg00002.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html","reference_id":"msg00004.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html","reference_id":"msg00009.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html","reference_id":"msg00013.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180104-0001/","reference_id":"ntap-20180104-0001","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"},{"reference_url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html","reference_id":"reading-privileged-memory-with-side.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0016","reference_id":"RHSA-2018:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0017","reference_id":"RHSA-2018:0017","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0017"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0018","reference_id":"RHSA-2018:0018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0020","reference_id":"RHSA-2018:0020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0021","reference_id":"RHSA-2018:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0022","reference_id":"RHSA-2018:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0023","reference_id":"RHSA-2018:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0027","reference_id":"RHSA-2018:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0028","reference_id":"RHSA-2018:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0292","reference_id":"RHSA-2018:0292","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1062","reference_id":"RHSA-2018:1062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1129","reference_id":"RHSA-2018:1129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1130","reference_id":"RHSA-2018:1130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1196","reference_id":"RHSA-2018:1196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1216","reference_id":"RHSA-2018:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1252","reference_id":"RHSA-2018:1252","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1252"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1319","reference_id":"RHSA-2018:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1346","reference_id":"RHSA-2018:1346","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1967","reference_id":"RHSA-2018:1967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1967"},{"reference_url":"https://spectreattack.com/","reference_id":"spectreattack.com","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://spectreattack.com/"},{"reference_url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html","reference_id":"Spectre-Information-Disclosure-Proof-Of-Concept.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"},{"reference_url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution","reference_id":"speculativeexecution","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"reference_url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability","reference_id":"speculative-processor-vulnerability","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf","reference_id":"ssa-608355.pdf","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"reference_url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/","reference_id":"suse-addresses-meltdown-spectre-vulnerabilities","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_18_01","reference_id":"Synology_SA_18_01","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.synology.com/support/security/Synology_SA_18_01"},{"reference_url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html","reference_id":"todays-cpu-vulnerability-what-you-need.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"},{"reference_url":"https://usn.ubuntu.com/usn/usn-3516-1/","reference_id":"usn-3516-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/usn/usn-3516-1/"},{"reference_url":"https://usn.ubuntu.com/3516-1/","reference_id":"USN-3516-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3516-1/"},{"reference_url":"https://usn.ubuntu.com/3530-1/","reference_id":"USN-3530-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3530-1/"},{"reference_url":"https://usn.ubuntu.com/3531-1/","reference_id":"USN-3531-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3531-1/"},{"reference_url":"https://usn.ubuntu.com/3531-3/","reference_id":"USN-3531-3","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3531-3/"},{"reference_url":"https://usn.ubuntu.com/3540-1/","reference_id":"USN-3540-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3540-1/"},{"reference_url":"https://usn.ubuntu.com/3540-2/","reference_id":"USN-3540-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3540-2/"},{"reference_url":"https://usn.ubuntu.com/3541-1/","reference_id":"USN-3541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3541-1/"},{"reference_url":"https://usn.ubuntu.com/3541-2/","reference_id":"USN-3541-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3541-2/"},{"reference_url":"https://usn.ubuntu.com/3542-1/","reference_id":"USN-3542-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3542-1/"},{"reference_url":"https://usn.ubuntu.com/3542-2/","reference_id":"USN-3542-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3542-2/"},{"reference_url":"https://usn.ubuntu.com/3549-1/","reference_id":"USN-3549-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3549-1/"},{"reference_url":"https://usn.ubuntu.com/3560-1/","reference_id":"USN-3560-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3560-1/"},{"reference_url":"https://usn.ubuntu.com/3561-1/","reference_id":"USN-3561-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3561-1/"},{"reference_url":"https://usn.ubuntu.com/3580-1/","reference_id":"USN-3580-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3580-1/"},{"reference_url":"https://usn.ubuntu.com/3581-1/","reference_id":"USN-3581-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3581-1/"},{"reference_url":"https://usn.ubuntu.com/3581-2/","reference_id":"USN-3581-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3581-2/"},{"reference_url":"https://usn.ubuntu.com/3582-1/","reference_id":"USN-3582-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3582-1/"},{"reference_url":"https://usn.ubuntu.com/3582-2/","reference_id":"USN-3582-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3582-2/"},{"reference_url":"https://usn.ubuntu.com/3594-1/","reference_id":"USN-3594-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3594-1/"},{"reference_url":"https://usn.ubuntu.com/3597-1/","reference_id":"USN-3597-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3597-1/"},{"reference_url":"https://usn.ubuntu.com/3597-2/","reference_id":"USN-3597-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3597-2/"},{"reference_url":"https://usn.ubuntu.com/3620-2/","reference_id":"USN-3620-2","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3620-2/"},{"reference_url":"https://usn.ubuntu.com/3690-1/","reference_id":"USN-3690-1","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3690-1/"},{"reference_url":"https://usn.ubuntu.com/3777-3/","reference_id":"USN-3777-3","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://usn.ubuntu.com/3777-3/"},{"reference_url":"https://cert.vde.com/en-us/advisories/vde-2018-002","reference_id":"vde-2018-002","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"},{"reference_url":"https://cert.vde.com/en-us/advisories/vde-2018-003","reference_id":"vde-2018-003","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"},{"reference_url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html","reference_id":"VMSA-2018-0002.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"},{"reference_url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html","reference_id":"VMSA-2018-0004.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"},{"reference_url":"https://www.vmware.com/security/advisories/VMSA-2018-0007.html","reference_id":"VMSA-2018-0007.html","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:31:09Z/"}],"url":"https://www.vmware.com/security/advisories/VMSA-2018-0007.html"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-254.html","reference_id":"XSA-254","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-254.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2017-5715"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v8fp-rzfq-e3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4137?format=json","vulnerability_id":"VCID-x6ks-k1hc-27du","summary":"DoS via non-preemptable L3/L4 pagetable freeing","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7540.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7540","reference_id":"","reference_type":"","scores":[{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25555","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0009","scoring_system":"epss","scoring_elements":"0.25572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29052","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29503","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.2943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29201","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.29137","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00111","scoring_system":"epss","scoring_elements":"0.28992","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544456","reference_id":"1544456","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1544456"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-252.html","reference_id":"XSA-252","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-252.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-7540","XSA-252"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x6ks-k1hc-27du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4138?format=json","vulnerability_id":"VCID-yaee-q1df-aqgm","summary":"x86: memory leak with MSR emulation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5244","reference_id":"","reference_type":"","scores":[{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1827","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18362","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18185","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18697","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18752","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18505","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18446","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18455","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18476","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18378","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-5244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/102433","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102433"},{"reference_url":"http://www.securitytracker.com/id/1040774","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040774"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528602","reference_id":"1528602","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1528602"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5244","reference_id":"CVE-2018-5244","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5244"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-253.html","reference_id":"XSA-253","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-253.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-5244","XSA-253"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yaee-q1df-aqgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4158?format=json","vulnerability_id":"VCID-yh4r-yysd-1ua5","summary":"oxenstored does not apply quota-maxentity","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-15470.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15470","reference_id":"","reference_type":"","scores":[{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39828","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39974","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.40002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.3999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.4","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39888","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39484","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.3955","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610552","reference_id":"1610552","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610552"},{"reference_url":"https://security.gentoo.org/glsa/201810-06","reference_id":"GLSA-201810-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201810-06"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-272.html","reference_id":"XSA-272","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-272.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79062?format=json","purl":"pkg:ebuild/app-emulation/xen-tools@4.10.1-r2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}],"aliases":["CVE-2018-15470","XSA-272"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yh4r-yysd-1ua5"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-emulation/xen-tools@4.10.1-r2"}